Flylib.com
Securing Linux: A Survival Guide for Linux Security (Version 2.0)
Securing Linux: A Survival Guide for Linux Security (Version 2.0)
ISBN: 0974372773
EAN: 2147483647
Year: 2002
Pages: 39
Authors:
David Koconis
,
Jim Murray
,
Jos Purvis
,
Darrin Wassom
BUY ON AMAZON
Table of Contents
BackCover
Securing Linux - A Survival Guide for Linux Security, Version 1.0
Introduction
1.0 Chapter 1: General Security Principles
1.2 DEFENSE-IN-DEPTH
1.3 PASSWORD PROTECTION
1.4 DATA STEWARDSHIP
1.5 PATCHINGUPGRADES
1.6 BACKUPRECOVERY PLAN
1.7 BASELINES AND CONTROL AUDITS
1.8 ACCOUNT MANAGEMENT
1.9 PHYSICAL SECURITY
2.0 Chapter 2: Securing Linux
2.2 NETWORK SECURITY
2.3 ACCESS CONTROL
2.4 USER ACCOUNT SECURITY
2.5 SECURING (DISABLING) SERVICES
2.6 APPLYING UPDATES AND PATCHES
2.7 FILE SYSTEM SECURITY
2.8 LOGGING
2.9 SCHEDULER SECURITY
3.0 Chapter 3: Securing Additional Services
3.2 E-MAIL SECURITY
3.3 FILEPRINT SECURITY
3.4 DNS SECURITY - BIND
4.0 Chapter 4: Additional Utilities
4.2 TRIPWIRE
4.3 INTRUSION DETECTION SYSTEMS
4.4 JOHN THE RIPPER
4.5 CRACK
4.6 BASTILLE
4.7 NMAP
4.8 NESSUS
4.9 PSIONIC PORTSENTRY
Appendix A: Resources And References
Appendix B: Sample Files
List of Tables
Securing Linux: A Survival Guide for Linux Security (Version 2.0)
ISBN: 0974372773
EAN: 2147483647
Year: 2002
Pages: 39
Authors:
David Koconis
,
Jim Murray
,
Jos Purvis
,
Darrin Wassom
BUY ON AMAZON
Network Security Architectures
Applied Knowledge Questions
Emerging Security Technologies
Case Studies
Network Security Is a System
Cisco IOS Cookbook (Cookbooks (OReilly))
Adjusting the Next-Hop Attribute
Viewing Frame Relay Status Information
Configuring DLSw
Adding a Comment to an ACL
NET-SNMP
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
Deployment Scenarios Using ACLs
Authenticating Firewall Sessions (Cut-Through Proxy Feature)
Access Control Lists
IPS Management Using ASDM
Sap Bw: a Step By Step Guide for Bw 2.0
BW Star Schema
Aggregates
Using 0RECORDMODE for Delta Load
Business Content
Performance Tuning
802.11 Wireless Networks: The Definitive Guide, Second Edition
Association
OFDM PMD
Reading the Specification Sheet
1X on Linux with xsupplicant
Ensuring Secrecy Through Encryption
What is Lean Six Sigma
The Four Keys to Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #2: Improve Your Processes
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies