Flylib.com
Practical Guide to Software Quality Management (Artech House Computing Library)
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
Mastering FreeBSD and OpenBSD Security
Table of Contents
Copyright
Preface
Audience
Assumptions This Book Makes
Contents of This Book
Conventions Used in This Book
Using Code Examples
Comments and Questions
Safari Enabled
Acknowledgments
Part I: Security Foundation
Chapter 1. The Big Picture
1.1. What Is System Security?
1.2. Identifying Risks
1.3. Responding to Risk
1.4. Security Process and Principles
1.5. System Security Principles
1.6. Wrapping Up
1.7. Resources
Chapter 2. BSD Security Building Blocks
2.1. Filesystem Protections
2.2. Tweaking a Running Kernel: sysctl
2.3. The Basic Sandbox: chroot
2.4. Jail: Beyond chroot
2.5. Inherent Protections
2.6. OS Tuning
2.7. Wrapping Up
2.8. Resources
Chapter 3. Secure Installation and Hardening
3.1. General Concerns
3.2. Installing FreeBSD
3.3. FreeBSD Hardening: Your First Steps
3.4. Installing OpenBSD
3.5. OpenBSD Hardening: Your First Steps
3.6. Post-Upgrade Hardening
3.7. Wrapping Up
3.8. Resources
Chapter 4. Secure Administration Techniques
4.1. Access Control
4.2. Security in Everyday Tasks
4.3. Upgrading
4.4. Security Vulnerability Response
4.5. Network Service Security
4.6. Monitoring System Health
4.7. Wrapping Up
4.8. Resources
Part II: Deployment Situations
Chapter 5. Creating a Secure DNS Server
5.1. The Criticality of DNS
5.2. DNS Software
5.3. Installing BIND
5.4. Installing djbdns
5.5. Operating BIND
5.6. Operating djbdns
5.7. Wrapping Up
5.8. Resources
Chapter 6. Building Secure Mail Servers
6.1. Mail Server Attacks
6.2. Mail Architecture
6.3. Mail and DNS
6.4. SMTP
6.5. Mail Server Configurations
6.6. Sendmail
6.7. Postfix
6.8. qmail
6.9. Mail Access
6.10. Wrapping Up
6.11. Resources
Chapter 7. Building a Secure Web Server
7.1. Web Server Attacks
7.2. Web Architecture
7.3. Apache
7.4. thttpd
7.5. Advanced Web Servers with Jails
7.6. Wrapping Up
7.7. Resources
Chapter 8. Firewalls
8.1. Firewall Architectures
8.2. Host Lockdown
8.3. The Options: IPFW Versus PF
8.4. Basic IPFW Configuration
8.5. Basic PF Configuration
8.6. Handling Failure
8.7. Wrapping Up
8.8. Resources
Chapter 9. Intrusion Detection
9.1. No Magic Bullets
9.2. IDS Architectures
9.3. NIDS on BSD
9.4. Snort
9.5. ACID
9.6. HIDS on BSD
9.7. Wrapping Up
9.8. Resources
Part III: Auditing and Incident Response
Chapter 10. Managing the Audit Trails
10.1. System Logging
10.2. Logging via syslogd
10.3. Securing a Loghost
10.4. logfile Management
10.5. Automated Log Monitoring
10.6. Automated Auditing Scripts
10.7. Wrapping Up
10.8. Resources
Chapter 11. Incident Response and Forensics
11.1. Incident Response
11.2. Forensics on BSD
11.3. Digging Deeper with the Sleuth Kit
11.4. Wrapping Up
11.5. Resources
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Summary
Summary
Creating a Shared Memory Segment
Key Terms and Concepts
Multiplexing I/O with select
Qshell for iSeries
Using Parameters and Variables
The Exit Status and Decision-Making
Additional Control Structures
Command-Line Arguments
Sed
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 2 Diagnosing and Troubleshooting
Domain 4 Motherboard/Processors/Memory
Domain 5 Printers
Domain 4 Networks
MySQL Cookbook
Using Copy and Paste as a mysql Input Source
Suppressing Column Headings in Query Output
Using Dates with Missing Components
Eliminating Duplicates from a Self-Join Result
Appendix A. Obtaining MySQL Software
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Handling WMI Events
Instrumenting .NET Applications with WMI
WMI Providers
DNS & BIND Cookbook
Organizing Zone Data Files in Different Directories
Configuring DNS So a Mail Server and the Email It Sends Pass Anti-Spam Tests
Configuring a Caching-Only Name Server
Looking Up Records Programmatically
Configuring rndc to Work Over IPv6
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies