Thank you for visiting us. We are currently updating our shopping cart and regret to advise that it will be unavailable until September 1, 2014. We apologise for any inconvenience and look forward to serving you again.

Wiley
Wiley.com
Print this page Share
E-book

Linux Security: Craig Hunt Linux Library

ISBN: 978-0-7821-5327-9
374 pages
February 2006
Linux Security: Craig Hunt Linux Library (0782153275) cover image
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threats of all kinds. Hundreds of clear, consistent examples illustrate these techniques in detail†so you stay on track and accomplish all your goals. Coverage includes:

  • Understanding information and system security procedures
  • Developing a corporate security policy
  • Designing and deploying an effective system and network monitoring strategy
  • Managing the network services offered by Linux servers
  • Understanding Sendmail security, including authentication and privacy
  • Providing application-level mail security using PGP
  • Designing and deploying an Apache HTTP server, including SSL extensions
  • Securing your Samba server
  • Building a network layer firewall using IPtables and Linux kernel v.2.4
  • Using the NEC SOCKS5 transport layer firewall
  • Deploying the TIS firewall toolkit
  • Offering secure remote connectivity with IPsec and PPTP VPNs
  • Adding strong user authentication to Linux servers using Kerberos
  • Understanding the Linux Pluggable Authentication Modules (PAM)
See More
Introduction.

Part 1: System Security.

Chapter 1: Understanding Linux Security.

Chapter 2: System Installation and Setup.

Chapter 3: System Monitoring and Auditing.

Part 2: Network Security.

Chapter 4: Network Services Configuration.

Chapter 5: Network Auditing and Monitoring.

Part 3: Application Security.

Chapter 6: Electronic Mail.

Chapter 7: HTTP Services.

Chapter 8: Samba Security.

Part 4: Perimeter Security.

Chapter 9: Network Layer Firewalls.

Chapter 10: Transport Layer Firewalls.

Chapter 11: Application Layer Firewalls.

Part 5: Remote Access and Authentication.

Chapter 12: Virtual Private Networking.

Chapter 13: Strong User Authentication.

Appendices.

Appendix A: Other Sources of Information.

Appendix B: PAM Module Reference.

Index.

See More
Ramón J. Hontañón has worked for more than a decade in the UNIX, TCP/IP internetworking, and information security fields, serving as UNIX application developer, UNIX systems administrator, information security consultant, and most recently senior manager of security product engineering at UUNET Technologies. He has extensive experience conducting security audits for government agencies and financial institutions and designing UNIX-based security solutions aimed at both internal and customer security.
See More
Back to Top