Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing LINUX Step by Step

Buy
Securing LINUX Step by Step, 9780967299204 (0967299209), SANS Press, 1999
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers, firewalls, parallel processing, and so forth. The examples and instructions are based on the Red Hat version 6.0 release. Red Hat was chosen because it has the largest share of the Linux market, and version 6.0 was chosen because it includes the latest stable release of the Linux kernel, system libraries, utilities, etc. However, the concepts, advice, and procedures in this guide should translate rather easily to other distributions. You may have to explore your system a little to find configuration files that are in different directories, and to determine which versions of the software packages have been installed, but the exploration itself can be a good instructional tool.

This guide takes you, the reader, through the installation process then splits into separate steps for securing a workstation setup and a server setup. The guide discusses basic packet firewalls in terms of protecting services on a single local computer. Finally, the guide discusses a few useful tools for monitoring and testing the security of your system. We try to follow the principle of “defense in depth.” No one step is a silver bullet against system attacks, but taken as a whole, they build multiple layers of defense that make life just that much harder for “script kiddies” and dedicated computer criminals.

About the Author
Lee Brotzman is a senior systems programmer for Allied Technology Group, Inc., where he provides contract support in computer security for NASA, NOAA, the Department of Justice, and the FBI. He worked at NASA Goddard Space Flight Center from 1983 to 1995, concentrating in research and development of networked scientific data analysis and distribution systems. During this time, he taught courses in UNIX programming, UNIX Security for Systems Administrators and UNIX Security Toolkits at NASA field centers around the country, a task he continued after leaving NASA to work as aa private consultant in the field of LINUX-based information systems development. Rehired by Allied to support NASIRC and DoJCERT, he currently specializes in assessing exploits and vulnerabilities in UNIX operating systems and analyzing "hacker" tools.
(HTML tags aren't allowed.)

Building Minecraft Server Modifications
Building Minecraft Server Modifications

Discover how to program your own server plugins and augment your Minecraft server with Bukkit

Overview

  • Create your own Minecraft server mods
  • Set up a Bukkit server that all your Minecraft friends can play on
  • Step by step instructions guide you through the creation of several...
Mac OS X Leopard Killer Tips
Mac OS X Leopard Killer Tips
Killer Tips books are written with one goal in mind: to allow the reader to work faster and smarter. In other books, you’ll often find that the most useful information is found in sidebars, tips, and notes. In a Killer Tips book, there’s nothing to weed through: it’s all sidebars, tips, and notes! Here, Scott Kelby gives you...
WordPress 3 Plugin Development Essentials
WordPress 3 Plugin Development Essentials

By picking up this book, there's a good chance that you fall into one of two categories: an existing WordPress user / hobbyist programmer who is interested in building your own plugins for the platform, or a seasoned developer who is new to WordPress and need to complete a project for a client.

In either case, this book is...


Distributed, Embedded and Real-time Java Systems
Distributed, Embedded and Real-time Java Systems
The Java language has had an enormous impact since its introduction in the last decade of the twentieth century. Its success has been particularly strong in enterprise applications, where Java is one of the preeminent technology in use. A domain where Java is still trying to gain a foothold is that of real-time and embedded...
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)

IBM’s Definitive One-Stop Guide to IMS Versions 12, 11, and 10: for Every IMS DBA, Developer, and System Programmer

 

Over 90% of the top Fortune® 1000 companies rely on IBM’s Information Management System...

Facial Analysis from Continuous Video with Applications to Human-Computer Interface (International Series on Biometrics)
Facial Analysis from Continuous Video with Applications to Human-Computer Interface (International Series on Biometrics)
Computer vision algorithms for the analysis of video data are obtained from a camera aimed at the user of an interactive system. It is potentially useful to enhance the interface between users and machines. These image sequences provide information from which machines can identify and keep track of their users, recognize their facial expressions...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy