| | Copyright |
| | Preface |
| | What You'll Learn from Reading This Book |
| | How This Book Is Organized |
| | Acknowledgments |
| | We Want to Hear from You! |
| | Reader Services |
| | Part I. SUSE Server Installation and Configuration |
| | | Chapter 1. Installing SUSE LINUX Enterprise Server |
| | | Installation Methods and Overview |
| | | Pre-Installation Planning |
| | | Ten Easy Steps to SLES 9 Installation |
| | | Troubleshooting |
| | | Summary |
| | | Chapter 2. Updating the Server |
| | | Maintaining Your System Configuration |
| | | Adding and Removing Packages |
| | | Adding and Removing Hardware |
| | | Changing Network Configuration |
| | | Summary |
| | | Chapter 3. Booting and Shutting Down the Server |
| | | Boot Loaders |
| | | Kernel Boot |
| | | init and Understanding Runlevels |
| | | System Shutdown |
| | | Emergency Boot and Recovery |
| | | Summary |
| | Part II. User Access and Security Management |
| | | Chapter 4. User and Group Administration |
| | | User and Group IDs |
| | | User and Group Data Files |
| | | User Account and Group Management Applications |
| | | Security Considerations |
| | | Summary |
| | | Chapter 5. User Environment Management and Security |
| | | Account Auditing |
| | | Configuring the User Environment |
| | | User Resource Management |
| | | su or sudo |
| | | Summary |
| | | Chapter 6. Filesystem Security |
| | | A Review of File and Directory Permissions |
| | | Default Access Permissions |
| | | Special File Permissions |
| | | Extended Attributes |
| | | Data and Filesystem Encryption |
| | | Secure File Deletion |
| | | Journaled Filesystems |
| | | Summary |
| | | Chapter 7. System Management and Monitoring |
| | | Common Linux Commands |
| | | The root Filesystem |
| | | Health Checks and System Monitoring |
| | | System Tuning |
| | | Summary |
| | Part III. Data Backup and Disaster Recovery |
| | | Chapter 8. Network Services |
| | | Angels and Daemons |
| | | Network Time Services |
| | | Email Services |
| | | File Transfer Services |
| | | Network File-Sharing Services |
| | | Remote Management Services |
| | | Network Name Services |
| | | Web Services |
| | | Authentication Services |
| | | Summary |
| | | Chapter 9. Printing Services |
| | | Printer Configuration |
| | | Print Job Lifecycle |
| | | Queue Management |
| | | Summary |
| | | Chapter 10. Data Backup and Disaster Recovery |
| | | A Look at Backup Strategies |
| | | Implementing a Backup Strategy |
| | | Backup and Restore Tools |
| | | SLES Boot and Rescue Disks |
| | | Summary |
| | Part IV. Securing Your SUSE Server |
| | | Chapter 11. Network Security Concepts |
| | | Corporate Security Policies |
| | | Summary |
| | | Chapter 12. Intrusion Detection |
| | | Defining Intrusions |
| | | Reducing Your Target Size |
| | | Vulnerability Assessments |
| | | Detecting a Network-based Intrusion |
| | | Detecting a Host Intrusion |
| | | Additional Tools |
| | | Summary |
| | | Chapter 13. System Security |
| | | System Hardening Principles |
| | | Using a Central syslog Server |
| | | Avoid Logging in As Root |
| | | Securing Network Services |
| | | System Hardening Packages |
| | | Automating SLES Hardening |
| | | Learning More About Threats |
| | | Summary |
| | Part V. Appendixes |
| | | Appendix A. Security Certifications |
| | | Appendix B. Resources |
| | | Linux Editors |
| | | Website Resources |
| | Index |