- Shopping Bag ( 0 items )
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total ...
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes—short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are:
Chapter 1: System Snapshots with Tripwire
Chapter 2: Firewalls with iptables and ipchains
Chapter 3: Network Access Control
Chapter 4: Authentication Techniques and Infrastructures
Chapter 5: Authorization Controls
Chapter 6: Protecting Outgoing Network Connections
Chapter 7: Protecting Files
Chapter 8: Protecting Email
Chapter 9: Testing and Monitoring
Posted April 15, 2004
The Linux Security Cookbook is a good hands-on guide to the major aspects of securing your Linux box. This book offers many quick reference guides to pieces of software for securing or testing your system and goes through many different means of fortifying your box including: -controlling system access with firewalls -monitoring your network -using SSH and SSL -intrusion detection systems -authentication and cryptographic keys -encrypting files and email messages -system security probing The recipes in this book allows administrators to learn quick and easy ways to secure their systems including over 150 ready-to-use scripts and configuration files without having to look up or research specific syntax. This book is definitely a quick hands-on guide to securing and monitoring your system and would recommend it to anyone looking for a good source of guides and ready-to-use scripts and configurations.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted July 16, 2003
Given the increasing frequency of attacks against computers, by virus writers, spammers and others, any sysadmin needs to pay careful attention to securing your system. All the more so if the computer acts as a server, rather than just a desktop leaf on a network. On the server side, you often have unix or linux systems. This recent book by OReilly is hence timely. Concise, with a good contents and index. The authors write clearly, in what may be considered a 'standard' cookbook style. Each problem is summarised, and a brief but entirely adequate how-to answer is then given. It is part of this style that they do not go into the theory of public/private key encryption, for example. But they readily provide references to fuller discussions on many topics. Checking the index for comprehensiveness revealed one curious omission. There is no entry for 'virus'. While it seems like a glaring oversight, I think the authors are correct in doing so. Antivirus software exists, and you would merely have to run it against a set of files. And this software is not usually part of an operating system. Also, most viruses are written for Microsoft desktops. Thus far, linux viruses are actually pretty rare. The title says 'Linux'. Actually, if you are running any major unix (Solaris, HPUX...), don't take that title too literally. The problems you face will often be the same as those described here. The solutions will often likewise be the same. Most unixes now have many utilities in common with each other and linux. You may be able to map an answer given here to a similar approach on your machine.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.