- Shopping Bag ( 0 items )
Posted February 25, 2005
The book plays to linux's strengths on server side computing. Where the server controls a subnet of computers that depend on it to connect them to the Internet, or for other resources. Bauer emphasises throughout how to secure the server. Starting with a top down risk analysis and a designing of a perimeter network; typically a DMZ. So he carefully suggests what belongs in the DMZ and what belongs behind it. He deprecates cleartext network communication, in favour of ssh and SSL for remote access. The book has concise explanations of various intrusion detection systems like Nesses and Vlad. Though perhaps if you do decide on using Nessus, you may also want to consult books devoted to it. Overall, the book is a sobering and cautionary tale of current computing. With the best practices recommended here, you can remain reasonably secure.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.