Flylib.com
Practical Guide to Software Quality Management (Artech House Computing Library)
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
Mastering FreeBSD and OpenBSD Security
Table of Contents
Copyright
Preface
Audience
Assumptions This Book Makes
Contents of This Book
Conventions Used in This Book
Using Code Examples
Comments and Questions
Safari Enabled
Acknowledgments
Part I: Security Foundation
Chapter 1. The Big Picture
1.1. What Is System Security?
1.2. Identifying Risks
1.3. Responding to Risk
1.4. Security Process and Principles
1.5. System Security Principles
1.6. Wrapping Up
1.7. Resources
Chapter 2. BSD Security Building Blocks
2.1. Filesystem Protections
2.2. Tweaking a Running Kernel: sysctl
2.3. The Basic Sandbox: chroot
2.4. Jail: Beyond chroot
2.5. Inherent Protections
2.6. OS Tuning
2.7. Wrapping Up
2.8. Resources
Chapter 3. Secure Installation and Hardening
3.1. General Concerns
3.2. Installing FreeBSD
3.3. FreeBSD Hardening: Your First Steps
3.4. Installing OpenBSD
3.5. OpenBSD Hardening: Your First Steps
3.6. Post-Upgrade Hardening
3.7. Wrapping Up
3.8. Resources
Chapter 4. Secure Administration Techniques
4.1. Access Control
4.2. Security in Everyday Tasks
4.3. Upgrading
4.4. Security Vulnerability Response
4.5. Network Service Security
4.6. Monitoring System Health
4.7. Wrapping Up
4.8. Resources
Part II: Deployment Situations
Chapter 5. Creating a Secure DNS Server
5.1. The Criticality of DNS
5.2. DNS Software
5.3. Installing BIND
5.4. Installing djbdns
5.5. Operating BIND
5.6. Operating djbdns
5.7. Wrapping Up
5.8. Resources
Chapter 6. Building Secure Mail Servers
6.1. Mail Server Attacks
6.2. Mail Architecture
6.3. Mail and DNS
6.4. SMTP
6.5. Mail Server Configurations
6.6. Sendmail
6.7. Postfix
6.8. qmail
6.9. Mail Access
6.10. Wrapping Up
6.11. Resources
Chapter 7. Building a Secure Web Server
7.1. Web Server Attacks
7.2. Web Architecture
7.3. Apache
7.4. thttpd
7.5. Advanced Web Servers with Jails
7.6. Wrapping Up
7.7. Resources
Chapter 8. Firewalls
8.1. Firewall Architectures
8.2. Host Lockdown
8.3. The Options: IPFW Versus PF
8.4. Basic IPFW Configuration
8.5. Basic PF Configuration
8.6. Handling Failure
8.7. Wrapping Up
8.8. Resources
Chapter 9. Intrusion Detection
9.1. No Magic Bullets
9.2. IDS Architectures
9.3. NIDS on BSD
9.4. Snort
9.5. ACID
9.6. HIDS on BSD
9.7. Wrapping Up
9.8. Resources
Part III: Auditing and Incident Response
Chapter 10. Managing the Audit Trails
10.1. System Logging
10.2. Logging via syslogd
10.3. Securing a Loghost
10.4. logfile Management
10.5. Automated Log Monitoring
10.6. Automated Auditing Scripts
10.7. Wrapping Up
10.8. Resources
Chapter 11. Incident Response and Forensics
11.1. Incident Response
11.2. Forensics on BSD
11.3. Digging Deeper with the Sleuth Kit
11.4. Wrapping Up
11.5. Resources
Colophon
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_X
index_Y
index_Z
Practical Guide to Software Quality Management (Artech House Computing Library)
ISBN: 596006268
EAN: 2147483647
Year: 2003
Pages: 142
Authors:
John W. Horch
BUY ON AMAZON
Similar book on Amazon
Beginning Cryptography with Java
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Filtering and Sorting Data
Updating a Primary Key Value
Avoiding Referential Integrity Problems When Updating the Data Source
Improving Paging Performance
A.1. General Considerations
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Structures
Optimizing: Reducing Parses
Other Tips
Data Dictionary Report
Interprocess Communications in Linux: The Nooks and Crannies
Command-Line Values
The fork System Call Revisited
IPC System Calls: A Synopsis
Basic Thread Management
C.2. RPC Definitions
CISSP Exam Cram 2
CISSPs in the Real World
Multiple-Choice Question Format
Network Equipment
Failure States
Common Attacks
101 Microsoft Visual Basic .NET Applications
Data Access
Building Windows Forms User Interfaces
Working with Console Applications
GDI+
Coding Conventions
Ruby Cookbook (Cookbooks (OReilly))
Managing Whitespace
Making Sure a Sorted Array Stays Sorted
Choosing Randomly from a Weighted List
Reading Documentation for Installed Gems
Running Periodic Tasks Without cron or at
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies