Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing LINUX Step by Step

Buy
Securing LINUX Step by Step, 9780967299204 (0967299209), SANS Press, 1999
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers, firewalls, parallel processing, and so forth. The examples and instructions are based on the Red Hat version 6.0 release. Red Hat was chosen because it has the largest share of the Linux market, and version 6.0 was chosen because it includes the latest stable release of the Linux kernel, system libraries, utilities, etc. However, the concepts, advice, and procedures in this guide should translate rather easily to other distributions. You may have to explore your system a little to find configuration files that are in different directories, and to determine which versions of the software packages have been installed, but the exploration itself can be a good instructional tool.

This guide takes you, the reader, through the installation process then splits into separate steps for securing a workstation setup and a server setup. The guide discusses basic packet firewalls in terms of protecting services on a single local computer. Finally, the guide discusses a few useful tools for monitoring and testing the security of your system. We try to follow the principle of “defense in depth.” No one step is a silver bullet against system attacks, but taken as a whole, they build multiple layers of defense that make life just that much harder for “script kiddies” and dedicated computer criminals.

About the Author
Lee Brotzman is a senior systems programmer for Allied Technology Group, Inc., where he provides contract support in computer security for NASA, NOAA, the Department of Justice, and the FBI. He worked at NASA Goddard Space Flight Center from 1983 to 1995, concentrating in research and development of networked scientific data analysis and distribution systems. During this time, he taught courses in UNIX programming, UNIX Security for Systems Administrators and UNIX Security Toolkits at NASA field centers around the country, a task he continued after leaving NASA to work as aa private consultant in the field of LINUX-based information systems development. Rehired by Allied to support NASIRC and DoJCERT, he currently specializes in assessing exploits and vulnerabilities in UNIX operating systems and analyzing "hacker" tools.
(HTML tags aren't allowed.)

Erdos on Graphs : His Legacy of Unsolved Problems
Erdos on Graphs : His Legacy of Unsolved Problems
A tribute to Paul Erdos, the wandering mathematician once described as the prince of problem solvers & the absolute monarch of problem posers, examines within the context of his personality & lifestyle the legacy of open problems he left to the world of mathematics after his death in 1996. DLC: Graph theory.

There is no
...
Critical Thinking: A Concise Guide
Critical Thinking: A Concise Guide
This concise guide offers relevant, rigorous and approachable methods... thoughtfully structured series of chapters, with clear definitions... this book [is] a valuable resource for developing a useful understanding of methods of persuasion. - Times Educational Supplement

Attempts to persuade us - to
...
Windows Home Server Users Guide (Expert's Voice)
Windows Home Server Users Guide (Expert's Voice)
If you’re searching for a practical and comprehensive guide to installing, configuring, and troubleshooting Microsofts Windows Home Server, look no further. Inside Windows Home Server User’s Guide, you’ll learn how to install, configure, and use Windows Home Server and understand how to connect to and manage different...

Frommer's China (Frommer's Complete Guides)
Frommer's China (Frommer's Complete Guides)

Frommer's China guides you to the highlights of this vast and varied land, and includes our authors' insider advice on the best experiences, from hiking through some of the most spectacular scenery on the planet to visiting traditional imperial sights.

  • Our expert authors, longtime residents in and...
XDoclet in Action (In Action series)
XDoclet in Action (In Action series)
A guide to the new XDoclet development tool that eliminates programming busy work by automatically generating code and other deployment artifacts, this book enables developers who place metadata in a single source code file to use XDoclet to generate additional source code and other files that are required in a project. Both smaller code...
Coupled Model Transformations for QoS Enabled Component-Based Software Design
Coupled Model Transformations for QoS Enabled Component-Based Software Design

Performance-aware Component-based Software-Development A characteristic of an engineering discipline is the ability to predict the impact of design decisions. For example, in civil engineering accurate predictions of the impact of adding an additional ?oor on a construction’s statics are available. Having a similar ability in software...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy