Linux Security Cookbook

( 2 )

Overview

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total ...

See more details below
Paperback (New Edition)
$34.83
BN.com price
(Save 12%)$39.99 List Price
Other sellers (Paperback)
  • All (21) from $1.99   
  • New (9) from $24.95   
  • Used (12) from $1.99   
Linux Security Cookbook

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$17.99
BN.com price
(Save 43%)$31.99 List Price

Overview

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes—short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are:

  • Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more
  • Monitoring your network with tcpdump, dsniff, netstat, and other tools
  • Protecting network connections with Secure Shell (SSH) and stunnel
  • Safeguarding email sessions with Secure Sockets Layer (SSL)
  • Encrypting files and email messages with GnuPG
  • Probing your own security with password crackers, nmap, and handy scripts
This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
Read More Show Less

Product Details

  • ISBN-13: 9780596003913
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 6/9/2003
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 336
  • Product dimensions: 7.12 (w) x 9.14 (h) x 0.89 (d)

Meet the Author

Dan Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He has written several O'Reilly books, as well as monthly columns for Compute! and Keyboard Magazine. Dan and his family reside in Boston.

Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He is the co-author of SSH, The Secure Shell: The Definitive Guide.

Read More Show Less

Table of Contents

Preface

Chapter 1: System Snapshots with Tripwire

Chapter 2: Firewalls with iptables and ipchains

Chapter 3: Network Access Control

Chapter 4: Authentication Techniques and Infrastructures

Chapter 5: Authorization Controls

Chapter 6: Protecting Outgoing Network Connections

Chapter 7: Protecting Files

Chapter 8: Protecting Email

Chapter 9: Testing and Monitoring

Colophon

Read More Show Less

Customer Reviews

Average Rating 4.5
( 2 )
Rating Distribution

5 Star

(1)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted April 15, 2004

    Pensacola LUG review book

    The Linux Security Cookbook is a good hands-on guide to the major aspects of securing your Linux box. This book offers many quick reference guides to pieces of software for securing or testing your system and goes through many different means of fortifying your box including: -controlling system access with firewalls -monitoring your network -using SSH and SSL -intrusion detection systems -authentication and cryptographic keys -encrypting files and email messages -system security probing The recipes in this book allows administrators to learn quick and easy ways to secure their systems including over 150 ready-to-use scripts and configuration files without having to look up or research specific syntax. This book is definitely a quick hands-on guide to securing and monitoring your system and would recommend it to anyone looking for a good source of guides and ready-to-use scripts and configurations.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted July 16, 2003

    Understandable and concise

    Given the increasing frequency of attacks against computers, by virus writers, spammers and others, any sysadmin needs to pay careful attention to securing your system. All the more so if the computer acts as a server, rather than just a desktop leaf on a network. On the server side, you often have unix or linux systems. This recent book by OReilly is hence timely. Concise, with a good contents and index. The authors write clearly, in what may be considered a 'standard' cookbook style. Each problem is summarised, and a brief but entirely adequate how-to answer is then given. It is part of this style that they do not go into the theory of public/private key encryption, for example. But they readily provide references to fuller discussions on many topics. Checking the index for comprehensiveness revealed one curious omission. There is no entry for 'virus'. While it seems like a glaring oversight, I think the authors are correct in doing so. Antivirus software exists, and you would merely have to run it against a set of files. And this software is not usually part of an operating system. Also, most viruses are written for Microsoft desktops. Thus far, linux viruses are actually pretty rare. The title says 'Linux'. Actually, if you are running any major unix (Solaris, HPUX...), don't take that title too literally. The problems you face will often be the same as those described here. The solutions will often likewise be the same. Most unixes now have many utilities in common with each other and linux. You may be able to map an answer given here to a similar approach on your machine.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)