Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Critical First Steps
Table 1-1: The Most Common Hardware Failures
Chapter 2: Hardening Network Access: Disable Unnecessary Services
Table 2-1: Runlevels
Table 2-2: Red Hat Enterprise Linux AS 3.0 Services Baseline
Table 2-3: SLES8 Services Baseline
Table 2-4: Services and Their Purposes
Table 2-5: Services and Dependencies Part 1
Table 2-6: Services and Dependencies Part 2
Table 2-7: Tools for Altering init Scripts and the Distributions in Which They Occur
Chapter 3: Installing Firewalls and Filters
Table 3-1: hosts.allow and hosts .deny Entry Types
Table 3-2: TCP Wrappers Wildcards
Table 3-3: TCP Wrapper Expansions
Table 3-4: Firewall Interface Access Policy Guidelines
Chapter 4: Hardening Software Accessibility
Table 4-1: RPM Options
Chapter 6: Hardening Access Controls
Table 6-1: Permission Mode Descriptions
Table 6-2: File Permission Modes for /etc/passwd
Table 6-3: Special File Permissions
Table 6-4: Special Directory Permissions
Chapter 9: Restricted Execution Environments
Table 9-1: Important spec Tags
Table 9-2: Important spec File Macro Definitions
Table 9-3: Important spec File Instructions
Chapter 10: Hardening Communications
Table 10-1: Protocol Comparison
Chapter 11: Install Network Monitoring Software
Table 11-1: ngrep Options
Table 11-2: ngrep Qualifiers
Table 11-3: Analysis of ngrep Output
Table 11-4: tcpdump Command Line Options
Table 11-5: tcpdump Qualifiers
Table 11-6: tcpdump Output Dissected
Table 11-7: Snort Packet Dump Overview
Table 11-8: Snort.conf configuration variables
Chapter 12: Automatic Logfile Scanning
Table 12-1: Selector Components
Table 12-2: Priorities
Table 12-3: logsurfer Fields
Table 12-4: logsurfer Actions
Chapter 13: Patch Management and Monitoring
Table 13-1: YaST2 Patch Groups
Table 13-2: up2date Options
Chapter 14: Self-Monitoring Tools
Table 14-1: rpm -Va Output Meaning
Chapter 15: Budget Acquisition and Corporate Commitment to Security
Table 15-1: Sample Prioritization Chart
Chapter 16: Establishing a Security Campaign
Table 16-1: Information Security Standards
Table 16-2: Policy Review Table
Table 16-3: Parallels for Home and Corporate Security
Previous page
Table of content
Next page
Hardening Linux
ISBN: 0072254971
EAN: 2147483647
Year: 2004
Pages: 113
Authors:
John Terpstra
,
Paul Love
,
Ronald P. Reck
,
Tim Scanlon
BUY ON AMAZON
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Developing a Kanban Design
Improving the Kanban
Conclusion
Appendix E EOQ vs. Kanban
Appendix F Implementation in Large Plants
A Practitioners Guide to Software Test Design
Domain Analysis Testing
Control Flow Testing
Section IV - Supporting Technologies
When to Stop Testing
Appendix A Brown & Donaldson Case Study
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Internet Protocol (IP) Basics
Windows Internet Name Service (WINS)
Internet Information Services (IIS) and the Internet Protocols
Internet Protocol Security (IPSec)
Virtual Private Networks (VPNs)
Cisco CallManager Fundamentals (2nd Edition)
H.323 Gateways
Meet-Me Conferencing
Overview of CDR Data
Summary
SIP Signaling
Java Concurrency in Practice
Documenting Synchronization Policies
Concurrent Collections
Other Liveness Hazards
Avoiding Performance Testing Pitfalls
Summary
Python Programming for the Absolute Beginner, 3rd Edition
Climbing the GUI Learning Curve
Submitting PyErrata Reports
Part IV: Assorted Topics
Add Python. Mix Well. Repeat.
Section B.5. Python Internet Resources
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies