Sams Teach Yourself Linux Security Basics in 24 Hours

Sams Teach Yourself Linux Security Basics in 24 Hours

by Aron Hsiao

Paperback

$29.99
Use Standard Shipping. For guaranteed delivery by December 24, use Express or Expedited Shipping.

Product Details

ISBN-13: 9780672320910
Publisher: Sams
Publication date: 04/27/2001
Series: Sams Teach Yourself Series
Pages: 432
Product dimensions: 7.20(w) x 8.90(h) x 1.00(d)

About the Author

Aron Hsiao is a computing entrepreneur and freelance network consultant with a background in UNIX-like operating systems stretching back to the mid-1980s. He has spent time as both an independent contractor and as a proprietor working in computer hardware and software retail, real-time software development, network deployment, Internet development, and Internet marketing. Aron has also worked as a volunteer in a number of different computer-related and education capacities in his local area. He has served as the About.com guide to Linux since 1997 and is the author of Que's The Concise Guide to XFree86 for Linux.

Table of Contents

Introduction1
Part IBasic Security for All Roles7
Hour 1Selecting and Installing a Linux Distribution9
Hour 2BIOS and Motherboards31
Hour 3Physical Security45
Hour 4The Boot Process55
Hour 5System and User Fundamentals69
Hour 6TCP/IP Network Security83
Hour 7File System Security99
Hour 8Extra File System Security Tools121
Hour 9Making the Most of Pluggable Authentication Modules (PAM)135
Part IINetwork Security147
Hour 10Using ipchains for Firewalling and Routing149
Hour 11Using iptables for Firewalling and Routing163
Hour 12Securing Apache, FTP, and SMTP Services179
Hour 13Network Security: DNS with BIND199
Hour 14Network Security: NFS and Samba209
Hour 15Securing X11R6 Access223
Part IIIData Encryption235
Hour 16Encrypting Data Streams237
Hour 17Introduction to Kerberos259
Hour 18Encrypting Web Data277
Hour 19Encrypting File System Data287
Hour 20Encrypting E-Mail Data299
Part IVIntrusion Detection, Auditing, and Recovery311
Hour 21Auditing and Monitoring313
Hour 22Detecting Attacks in Progress327
Hour 23Preserving Data337
Hour 24Recovering from Attacks351
Part VAppendixes363
Appendix AConfiguration Files Important to Security365
Appendix BSystem Account File Formats369
Appendix CSecurity Web Sites of Note371
Appendix DQuick Security Checklist375
Appendix EWeb Links to Documented Software383
Index385

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews