Team LiB   Previous Section   Next Section
   
   
•  Table of Contents
•  Index
•  Reviews
•  Reader Reviews
•  Errata
Building Secure Servers with Linux
By Michael D. Bauer
 
Publisher : O'Reilly
Pub Date : October 2002
ISBN : 0-596-00217-3
Pages : 448
Slots : 1  


    Copyright
    Preface
      What This Book Is About
      The Paranoid Penguin Connection
      Audience
      What This Book Doesn't Cover
      Assumptions This Book Makes
      Conventions Used in This Book
      Request for Comments
      Acknowledgments
   
    Chapter 1.  Threat Modeling and Risk Management
      Section 1.1.  Components of Risk
      Section 1.2.  Simple Risk Analysis: ALEs
      Section 1.3.  An Alternative: Attack Trees
      Section 1.4.  Defenses
      Section 1.5.  Conclusion
      Section 1.6.  Resources
   
    Chapter 2.  Designing Perimeter Networks
      Section 2.1.  Some Terminology
      Section 2.2.  Types of Firewall and DMZ Architectures
      Section 2.3.  Deciding What Should Reside on the DMZ
      Section 2.4.  Allocating Resources in the DMZ
      Section 2.5.  The Firewall
   
    Chapter 3.  Hardening Linux
      Section 3.1.  OS Hardening Principles
      Section 3.2.  Automated Hardening with Bastille Linux
   
    Chapter 4.  Secure Remote Administration
      Section 4.1.  Why It's Time to Retire Clear-Text Admin Tools
      Section 4.2.  Secure Shell Background and Basic Use
      Section 4.3.  Intermediate and Advanced SSH
      Section 4.4.  Other Handy Tools
   
    Chapter 5.  Tunneling
      Section 5.1.  Stunnel and OpenSSL: Concepts
   
    Chapter 6.  Securing Domain Name Services (DNS)
      Section 6.1.  DNS Basics
      Section 6.2.  DNS Security Principles
      Section 6.3.  Selecting a DNS Software Package
      Section 6.4.  Securing BIND
      Section 6.5.  djbdns
      Section 6.6.  Resources
   
    Chapter 7.  Securing Internet Email
      Section 7.1.  Background: MTA and SMTP Security
      Section 7.2.  Using SMTP Commands to Troubleshoot and Test SMTP Servers
      Section 7.3.  Securing Your MTA
      Section 7.4.  Sendmail
      Section 7.5.  Postfix
      Section 7.6.  Resources
   
    Chapter 8.  Securing Web Services
      Section 8.1.  Web Server Security
      Section 8.2.  Build Time: Installing Apache
      Section 8.3.  Setup Time: Configuring Apache
      Section 8.4.  Runtime: Securing CGI Scripts
      Section 8.5.  Special Topics
      Section 8.6.  Other Servers and Web Security
   
    Chapter 9.  Securing File Services
      Section 9.1.  FTP Security
      Section 9.2.  Other File-Sharing Methods
      Section 9.3.  Resources
   
    Chapter 10.  System Log Management and Monitoring
      Section 10.1.  syslog
      Section 10.2.  Syslog-ng
      Section 10.3.  Testing System Logging with logger
      Section 10.4.  Managing System-Log Files
      Section 10.5.  Using Swatch for Automated Log Monitoring
      Section 10.6.  Resources
   
    Chapter 11.  Simple Intrusion Detection Techniques
      Section 11.1.  Principles of Intrusion Detection Systems
      Section 11.2.  Using Tripwire
      Section 11.3.  Other Integrity Checkers
      Section 11.4.  Snort
      Section 11.5.  Resources
   
    Appendix A.  Two Complete Iptables Startup Scripts
    Colophon
    Index
Team LiB   Previous Section   Next Section