Flylib.com
Practical Guide to Software Quality Management (Artech House Computing Library)
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
Mastering FreeBSD and OpenBSD Security
Table of Contents
Copyright
Preface
Audience
Assumptions This Book Makes
Contents of This Book
Conventions Used in This Book
Using Code Examples
Comments and Questions
Safari Enabled
Acknowledgments
Part I: Security Foundation
Chapter 1. The Big Picture
1.1. What Is System Security?
1.2. Identifying Risks
1.3. Responding to Risk
1.4. Security Process and Principles
1.5. System Security Principles
1.6. Wrapping Up
1.7. Resources
Chapter 2. BSD Security Building Blocks
2.1. Filesystem Protections
2.2. Tweaking a Running Kernel: sysctl
2.3. The Basic Sandbox: chroot
2.4. Jail: Beyond chroot
2.5. Inherent Protections
2.6. OS Tuning
2.7. Wrapping Up
2.8. Resources
Chapter 3. Secure Installation and Hardening
3.1. General Concerns
3.2. Installing FreeBSD
3.3. FreeBSD Hardening: Your First Steps
3.4. Installing OpenBSD
3.5. OpenBSD Hardening: Your First Steps
3.6. Post-Upgrade Hardening
3.7. Wrapping Up
3.8. Resources
Chapter 4. Secure Administration Techniques
4.1. Access Control
4.2. Security in Everyday Tasks
4.3. Upgrading
4.4. Security Vulnerability Response
4.5. Network Service Security
4.6. Monitoring System Health
4.7. Wrapping Up
4.8. Resources
Part II: Deployment Situations
Chapter 5. Creating a Secure DNS Server
5.1. The Criticality of DNS
5.2. DNS Software
5.3. Installing BIND
5.4. Installing djbdns
5.5. Operating BIND
5.6. Operating djbdns
5.7. Wrapping Up
5.8. Resources
Chapter 6. Building Secure Mail Servers
6.1. Mail Server Attacks
6.2. Mail Architecture
6.3. Mail and DNS
6.4. SMTP
6.5. Mail Server Configurations
6.6. Sendmail
6.7. Postfix
6.8. qmail
6.9. Mail Access
6.10. Wrapping Up
6.11. Resources
Chapter 7. Building a Secure Web Server
7.1. Web Server Attacks
7.2. Web Architecture
7.3. Apache
7.4. thttpd
7.5. Advanced Web Servers with Jails
7.6. Wrapping Up
7.7. Resources
Chapter 8. Firewalls
8.1. Firewall Architectures
8.2. Host Lockdown
8.3. The Options: IPFW Versus PF
8.4. Basic IPFW Configuration
8.5. Basic PF Configuration
8.6. Handling Failure
8.7. Wrapping Up
8.8. Resources
Chapter 9. Intrusion Detection
9.1. No Magic Bullets
9.2. IDS Architectures
9.3. NIDS on BSD
9.4. Snort
9.5. ACID
9.6. HIDS on BSD
9.7. Wrapping Up
9.8. Resources
Part III: Auditing and Incident Response
Chapter 10. Managing the Audit Trails
10.1. System Logging
10.2. Logging via syslogd
10.3. Securing a Loghost
10.4. logfile Management
10.5. Automated Log Monitoring
10.6. Automated Auditing Scripts
10.7. Wrapping Up
10.8. Resources
Chapter 11. Incident Response and Forensics
11.1. Incident Response
11.2. Forensics on BSD
11.3. Digging Deeper with the Sleuth Kit
11.4. Wrapping Up
11.5. Resources
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
MySQL Clustering
Installation
Obtaining, Installing, and Configuring MySQL Cluster on Other Platforms
Common Errors While Importing Tables
Configuration
Backup and Recovery
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Interacting with the Operating System
Working with the .NET Framework
Visual Studio .NET
Coding Conventions
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Retail Logistics: Changes and Challenges
The Internationalization of the Retail Supply Chain
Fashion Logistics and Quick Response
Temperature-Controlled Supply Chains
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Twisted Network Programming Essentials
Installing from Source Files
Accessing a Password-Protected Page
Storing Web Data in an SQL Database
Authenticating Against a Database Table
Running Commands on a Remote Server
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The ROI of Lean Six Sigma for Services
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Executing Corporate Strategy with Lean Six Sigma
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Java All-In-One Desk Reference For Dummies
Adding Some Methods to Your Madness
Using Arrays
Creating Generic Collection Classes
Book VI - Swing
Using Images and Sound
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies