Flylib.com
Practical Guide to Software Quality Management (Artech House Computing Library)
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
Mastering FreeBSD and OpenBSD Security
Table of Contents
Copyright
Preface
Audience
Assumptions This Book Makes
Contents of This Book
Conventions Used in This Book
Using Code Examples
Comments and Questions
Safari Enabled
Acknowledgments
Part I: Security Foundation
Chapter 1. The Big Picture
1.1. What Is System Security?
1.2. Identifying Risks
1.3. Responding to Risk
1.4. Security Process and Principles
1.5. System Security Principles
1.6. Wrapping Up
1.7. Resources
Chapter 2. BSD Security Building Blocks
2.1. Filesystem Protections
2.2. Tweaking a Running Kernel: sysctl
2.3. The Basic Sandbox: chroot
2.4. Jail: Beyond chroot
2.5. Inherent Protections
2.6. OS Tuning
2.7. Wrapping Up
2.8. Resources
Chapter 3. Secure Installation and Hardening
3.1. General Concerns
3.2. Installing FreeBSD
3.3. FreeBSD Hardening: Your First Steps
3.4. Installing OpenBSD
3.5. OpenBSD Hardening: Your First Steps
3.6. Post-Upgrade Hardening
3.7. Wrapping Up
3.8. Resources
Chapter 4. Secure Administration Techniques
4.1. Access Control
4.2. Security in Everyday Tasks
4.3. Upgrading
4.4. Security Vulnerability Response
4.5. Network Service Security
4.6. Monitoring System Health
4.7. Wrapping Up
4.8. Resources
Part II: Deployment Situations
Chapter 5. Creating a Secure DNS Server
5.1. The Criticality of DNS
5.2. DNS Software
5.3. Installing BIND
5.4. Installing djbdns
5.5. Operating BIND
5.6. Operating djbdns
5.7. Wrapping Up
5.8. Resources
Chapter 6. Building Secure Mail Servers
6.1. Mail Server Attacks
6.2. Mail Architecture
6.3. Mail and DNS
6.4. SMTP
6.5. Mail Server Configurations
6.6. Sendmail
6.7. Postfix
6.8. qmail
6.9. Mail Access
6.10. Wrapping Up
6.11. Resources
Chapter 7. Building a Secure Web Server
7.1. Web Server Attacks
7.2. Web Architecture
7.3. Apache
7.4. thttpd
7.5. Advanced Web Servers with Jails
7.6. Wrapping Up
7.7. Resources
Chapter 8. Firewalls
8.1. Firewall Architectures
8.2. Host Lockdown
8.3. The Options: IPFW Versus PF
8.4. Basic IPFW Configuration
8.5. Basic PF Configuration
8.6. Handling Failure
8.7. Wrapping Up
8.8. Resources
Chapter 9. Intrusion Detection
9.1. No Magic Bullets
9.2. IDS Architectures
9.3. NIDS on BSD
9.4. Snort
9.5. ACID
9.6. HIDS on BSD
9.7. Wrapping Up
9.8. Resources
Part III: Auditing and Incident Response
Chapter 10. Managing the Audit Trails
10.1. System Logging
10.2. Logging via syslogd
10.3. Securing a Loghost
10.4. logfile Management
10.5. Automated Log Monitoring
10.6. Automated Auditing Scripts
10.7. Wrapping Up
10.8. Resources
Chapter 11. Incident Response and Forensics
11.1. Incident Response
11.2. Forensics on BSD
11.3. Digging Deeper with the Sleuth Kit
11.4. Wrapping Up
11.5. Resources
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
How Does Defining a Project Relate to Project Planning?
The Common Sources of Project Risk
Best Practices of Effective Project Communicators
Ten Key Principles
Special Situations
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
User Logon and Device Configuration
Catalyst Switch Role in IP Telephony
Introduction to Cisco CallManager Attendant Console
Configuring the Device Security Mode
Data Structures and Algorithms in Java
Summary
Counting Steps
Contiguous Representation of Multidimensional Arrays
Summary
D.1. Data Structures and Algorithms
The Java Tutorial: A Short Course on the Basics, 4th Edition
First Steps (MacOS)
Expressions, Statements, and Blocks
Advantages of Exceptions
Customizing a Threads run Method
Finishing an Applet
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 7. Send SMS from a PowerBook
Hack 56. Send Power over Your Ethernet
Hack 61. Unwire Your Pistol Mouse
Hack 88. Primestar Dish with Biquad Feed
Section A.8. CDPD, 1xRTT, and GPRS: Cellular Data Networks
Ruby Cookbook (Cookbooks (OReilly))
Seeing When a File Was Last Used Problem
Listing a Directory
Listing Methods Unique to an Object
Doing Aspect-Oriented Programming
Converting an XML Document into a Hash
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies