Hardening Linux / James Turnbull.
By: Turnbull, James.
Material type: TextPublisher: Berkeley, CA : New York : Apress ; Distributed by Springer-Verlag, c2005General Notes: "Learn how to quickly secure your Linux hosts and applications against attack."--Cover.Description: xxvii, 552 p. ; 24 cm.ISBN: 1590594444 (paperback).Subject(s): Linux | Linux device drivers (Computer programs) | Computer security | Software maintenance | Computer networks -- Security measuresItem type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Two Weeks | Davenport Library Circulating Collection | Print-Circulating | 005.8 T849 (Browse shelf(Opens below)) | Available | 34284003324142 |
Browsing Davenport Library shelves, Shelving location: Circulating Collection, Collection: Print-Circulating Close shelf browser (Hides shelf browser)
005.8 Si643 2014 Cybersecurity and cyberwar : what everyone needs to know / | 005.8 So475 2011 Security strategies in Windows platforms and applications / | 005.8 St899 2012 Hacking the future : privacy, identity, and anonymity on the Web / | 005.8 T849 Hardening Linux / | 005.8 V671 2009 The myths of security : what the computer security industry doesn't want you to know / | 005.8 W151 Absolute beginner's guide to security, spam, spyware and viruses / | 005.84 B672 2011 Worm : the first digital world war / |
"Learn how to quickly secure your Linux hosts and applications against attack."--Cover.
Chapter 1: Hardening the basics -- Chapter 2: Firewalling your hosts -- Chapter 3: Securing connections and remote administration -- Chapter 4: Securing files and file systems -- Chapter 5: Understanding logging and log monitoring -- Chapter 6: Using tools for security testing -- Chapter 7: Securing your mail server -- Chapter 8: Authenticating and securing your mail -- Chapter 9: Hardening remote access to e-mail -- Chapter 10: Securing an FTP server -- Chapter 11: Hardening DNS and BIND -- Appendix A: The bastion host firewall script -- Appendix B: BIND configuration files -- Appendix C: Checkpoints.
There are no comments on this title.