Linux Security Cookbook: Security Tools & Techniques

Linux Security Cookbook: Security Tools & Techniques
ISBN-10
1449366767
ISBN-13
9781449366766
Category
Computers
Pages
336
Language
English
Published
2003-06-02
Publisher
"O'Reilly Media, Inc."
Authors
Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes

Description

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.

Other editions

Similar books

  • Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition
    By Tajinder Kalsi

    With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files.

  • Practical Linux Security Cookbook
    By Tajinder Kalsi

    Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems.

  • Practical Linux Security Cookbook
    By Vance Pratt

    Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems.

  • Linux Networking Cookbook: From Asterisk to Zebra with Easy-to-Use Recipes
    By Carla Schroder

    If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for ...

  • Linux Server Security: Hack and Defend
    By Chris Binnie

    Rob has worked for countless clients, including Wiley Publishing, Pearson Education, CompTIA, Entrepreneur magazine, Microsoft, McGrawr Hill Education, Cisco, and the National Security Agency.

  • Kali Linux Cookbook
    By Willie L. Pritchett, David De Smet

    The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.This book is ideal ...

  • Android Security Cookbook
    By Keith Makan, Scott Alexander-Bown

    Android Security Cookbook is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers ...

  • Kali Linux Web Penetration Testing Cookbook
    By Gilberto Nájera-Gutiérrez

    Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 About This Book Familiarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take ...

  • Unix, Solaris And Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-party Applications
    By Boris Loza

    Covers Solaris 10. Included are ready-to-use scripts and configuration files that will be a valuable resource in you endeavor to secure your systems.

  • Linux Server Security
    By Michael D. Bauer

    Long-Form Commands Versus Short-Form Throughout this chapter, I use the longform of Tripwire commands: any flag or directive beginning with a double-dash (“--”) is a long form and has a corresponding short form.