BN.com Gift Guide

Linux Server Security

( 1 )

Overview

Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical ...

See more details below
Other sellers (Paperback)
  • All (17) from $3.00   
  • New (7) from $24.25   
  • Used (10) from $3.00   
Sending request ...

Overview

Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux—as a hub offering services to an organization or the Internet—and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell.Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic.A number of new security topics have been added for this edition, including:

  • Database security, with a focus on MySQL
  • Using OpenLDAP for authentication
  • An introduction to email encryption
  • The Cyrus IMAP service, a popular mail delivery agent
  • The vsftpd FTP server
Geared toward Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Linux Server Security with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages on several popular distributions. With this book in hand, you'll have both the expertise and the tools to comprehensively secure your Linux system.
Read More Show Less

Product Details

  • ISBN-13: 9780596006709
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 1/25/2005
  • Edition description: Second Edition
  • Edition number: 2
  • Pages: 544
  • Product dimensions: 7.04 (w) x 9.12 (h) x 1.02 (d)

Meet the Author

Michael D. (Mick) Bauer, CISSP, is Network Security Architect for alarge financial services provider. He is also Security Editor forLinux Journal Magazine, and author of its monthly "Paranoid Penguin" security column. Mick's areas of expertise include Linux security and general Unix security, network (TCP/IP) security, security assessment, and the development of security policies and awareness programs.

Read More Show Less

Table of Contents

Copyright

Dedication

Preface

Chapter 1: Threat Modeling and Risk Management

Chapter 2: Designing Perimeter Networks

Chapter 3: Hardening Linux and Using iptables

Chapter 4: Secure Remote Administration

Chapter 5: OpenSSL and Stunnel

Chapter 6: Securing Domain Name Services (DNS)

Chapter 7: Using LDAP for Authentication

Chapter 8: Database Security

Chapter 9: Securing Internet Email

Chapter 10: Securing Web Servers

Chapter 11: Securing File Services

Chapter 12: System Log Management and Monitoring

Chapter 13: Simple Intrusion Detection Techniques

Appendix A: Two Complete iptables Startup Scripts

Colophon

Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted February 25, 2005

    best practices

    The book plays to linux's strengths on server side computing. Where the server controls a subnet of computers that depend on it to connect them to the Internet, or for other resources. Bauer emphasises throughout how to secure the server. Starting with a top down risk analysis and a designing of a perimeter network; typically a DMZ. So he carefully suggests what belongs in the DMZ and what belongs behind it. He deprecates cleartext network communication, in favour of ssh and SSL for remote access. The book has concise explanations of various intrusion detection systems like Nesses and Vlad. Though perhaps if you do decide on using Nessus, you may also want to consult books devoted to it. Overall, the book is a sobering and cautionary tale of current computing. With the best practices recommended here, you can remain reasonably secure.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)