Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing LINUX Step by Step

Buy
Securing LINUX Step by Step, 9780967299204 (0967299209), SANS Press, 1999
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers, firewalls, parallel processing, and so forth. The examples and instructions are based on the Red Hat version 6.0 release. Red Hat was chosen because it has the largest share of the Linux market, and version 6.0 was chosen because it includes the latest stable release of the Linux kernel, system libraries, utilities, etc. However, the concepts, advice, and procedures in this guide should translate rather easily to other distributions. You may have to explore your system a little to find configuration files that are in different directories, and to determine which versions of the software packages have been installed, but the exploration itself can be a good instructional tool.

This guide takes you, the reader, through the installation process then splits into separate steps for securing a workstation setup and a server setup. The guide discusses basic packet firewalls in terms of protecting services on a single local computer. Finally, the guide discusses a few useful tools for monitoring and testing the security of your system. We try to follow the principle of “defense in depth.” No one step is a silver bullet against system attacks, but taken as a whole, they build multiple layers of defense that make life just that much harder for “script kiddies” and dedicated computer criminals.

About the Author
Lee Brotzman is a senior systems programmer for Allied Technology Group, Inc., where he provides contract support in computer security for NASA, NOAA, the Department of Justice, and the FBI. He worked at NASA Goddard Space Flight Center from 1983 to 1995, concentrating in research and development of networked scientific data analysis and distribution systems. During this time, he taught courses in UNIX programming, UNIX Security for Systems Administrators and UNIX Security Toolkits at NASA field centers around the country, a task he continued after leaving NASA to work as aa private consultant in the field of LINUX-based information systems development. Rehired by Allied to support NASIRC and DoJCERT, he currently specializes in assessing exploits and vulnerabilities in UNIX operating systems and analyzing "hacker" tools.
(HTML tags aren't allowed.)

3D Printing with SketchUp
3D Printing with SketchUp

Real-world case studies to help you design models in SketchUp for 3D printing on anything ranging from the smallest desktop machines to the largest industrial 3D printers

Overview

  • Learn how to design beautiful architectural models that will print on any 3D printer
  • Packed with clearly...
Model-Based Software Testing and Analysis with C#
Model-Based Software Testing and Analysis with C#
This book teaches new methods for specifying, analyzing, and testing software; essentials for creating high-quality software. These methods increase the automation in each of these steps, making them more timely, more thorough, and more effective. The authors work through several realistic case studies in-depth and detail, using a toolkit built on...
VB.NET Core Classes in a Nutshell
VB.NET Core Classes in a Nutshell
The .NET platform gives Visual Basic developers access to an entirely new and comprehensive class library that promises to further simplify and speed VB application development. In VB.NET Core Classes in a Nutshell, VB Programmers will find a concise and thorough reference to the types found in the core namespaces of the .NET Framework...

Transactions on Petri Nets and Other Models of Concurrency III
Transactions on Petri Nets and Other Models of Concurrency III

These Transactions publish archival papers in the broad area of Petri nets and other models of concurrency, ranging from theoretical work to tool support and industrial applications. ToPNoC issues are published as LNCS volumes, and hence are widely distributed and indexed. This Journal has its own Editorial Board which selects papers based on a...

Make, Volume 6: Technology on Your Time (Make: Technology on Your Time)
Make, Volume 6: Technology on Your Time (Make: Technology on Your Time)

If you like to tweak, disassemble, recreate, and invent cool new uses for technology, you'll love MAKE, our quarterly publication for the inquisitive do-it-yourselfer.

Every issue is packed with projects to help you make the most of all the technology in your life. Everything from home entertainment systems, to...

Upgrading and Repairing PCs (14th Edition)
Upgrading and Repairing PCs (14th Edition)
This is the newest comprehensive update to the world's #1 guide to PC repair and maintenance. Worldrenowned PC hardware expert Scott Mueller has thoroughly updated his legendary Upgrading and Repairing PCs to reflect today's latest PC technologies, and added a new DVD with more than two hours of digital video demonstrating PC maintenance and...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy