Flylib.com
Practical Guide to Software Quality Management (Artech House Computing Library)
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
Mastering FreeBSD and OpenBSD Security
Table of Contents
Copyright
Preface
Audience
Assumptions This Book Makes
Contents of This Book
Conventions Used in This Book
Using Code Examples
Comments and Questions
Safari Enabled
Acknowledgments
Part I: Security Foundation
Chapter 1. The Big Picture
1.1. What Is System Security?
1.2. Identifying Risks
1.3. Responding to Risk
1.4. Security Process and Principles
1.5. System Security Principles
1.6. Wrapping Up
1.7. Resources
Chapter 2. BSD Security Building Blocks
2.1. Filesystem Protections
2.2. Tweaking a Running Kernel: sysctl
2.3. The Basic Sandbox: chroot
2.4. Jail: Beyond chroot
2.5. Inherent Protections
2.6. OS Tuning
2.7. Wrapping Up
2.8. Resources
Chapter 3. Secure Installation and Hardening
3.1. General Concerns
3.2. Installing FreeBSD
3.3. FreeBSD Hardening: Your First Steps
3.4. Installing OpenBSD
3.5. OpenBSD Hardening: Your First Steps
3.6. Post-Upgrade Hardening
3.7. Wrapping Up
3.8. Resources
Chapter 4. Secure Administration Techniques
4.1. Access Control
4.2. Security in Everyday Tasks
4.3. Upgrading
4.4. Security Vulnerability Response
4.5. Network Service Security
4.6. Monitoring System Health
4.7. Wrapping Up
4.8. Resources
Part II: Deployment Situations
Chapter 5. Creating a Secure DNS Server
5.1. The Criticality of DNS
5.2. DNS Software
5.3. Installing BIND
5.4. Installing djbdns
5.5. Operating BIND
5.6. Operating djbdns
5.7. Wrapping Up
5.8. Resources
Chapter 6. Building Secure Mail Servers
6.1. Mail Server Attacks
6.2. Mail Architecture
6.3. Mail and DNS
6.4. SMTP
6.5. Mail Server Configurations
6.6. Sendmail
6.7. Postfix
6.8. qmail
6.9. Mail Access
6.10. Wrapping Up
6.11. Resources
Chapter 7. Building a Secure Web Server
7.1. Web Server Attacks
7.2. Web Architecture
7.3. Apache
7.4. thttpd
7.5. Advanced Web Servers with Jails
7.6. Wrapping Up
7.7. Resources
Chapter 8. Firewalls
8.1. Firewall Architectures
8.2. Host Lockdown
8.3. The Options: IPFW Versus PF
8.4. Basic IPFW Configuration
8.5. Basic PF Configuration
8.6. Handling Failure
8.7. Wrapping Up
8.8. Resources
Chapter 9. Intrusion Detection
9.1. No Magic Bullets
9.2. IDS Architectures
9.3. NIDS on BSD
9.4. Snort
9.5. ACID
9.6. HIDS on BSD
9.7. Wrapping Up
9.8. Resources
Part III: Auditing and Incident Response
Chapter 10. Managing the Audit Trails
10.1. System Logging
10.2. Logging via syslogd
10.3. Securing a Loghost
10.4. logfile Management
10.5. Automated Log Monitoring
10.6. Automated Auditing Scripts
10.7. Wrapping Up
10.8. Resources
Chapter 11. Incident Response and Forensics
11.1. Incident Response
11.2. Forensics on BSD
11.3. Digging Deeper with the Sleuth Kit
11.4. Wrapping Up
11.5. Resources
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Operations Security
Understanding Certification and Accreditation
Continuous Monitoring Process
Appendix E The Information System Security Management Professional (ISSMP) Certification
Appendix G Control Baselines
Documenting Software Architectures: Views and Beyond
A Standard Organization for Interface Documentation
Discussion Questions
Summary Checklist
Appendix A. Excerpts from a Software Architecture Documentation Package
Allocation Deployment View
The Complete Cisco VPN Configuration Guide
Summary
Authentication Methods
Routing on the Concentrator
Routers as Certificate Authorities
L2L Connection Examples
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Viewing Table Descriptions
The CASE Expression
Creating, Destroying, and Viewing Databases
Client 2Adding Error Checking
Overview
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Making Quantitative Decisions
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Special Topics in Quantitative Management
Digital Character Animation 3 (No. 3)
Creating Characters
Understanding Motion
Transitions
Conclusion
Characters and Story
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies