1 / 834
文档名称:

Prentice Hall - Real World Linux Security Intrusion Prevention Detection And Recovery.pdf

格式:pdf   页数:834
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Prentice Hall - Real World Linux Security Intrusion Prevention Detection And Recovery.pdf

上传人:bolee65 2014/4/17 文件大小:0 KB

下载得到文件列表

Prentice Hall - Real World Linux Security Intrusion Prevention Detection And Recovery.pdf

文档介绍

文档介绍:Real World Linux® Security: Intrusion Prevention, Detection, and Recovery
By Bob Toxen
Publisher: Prentice Hall PTR
Pub Date: November 30, 2000
ISBN: 0-13-028187-5
Pages: 736
Copyright
List of Figures
List of Tables
Foreword
Acknowledgments
About the Author
Chapter 1. Introduction
Section . Who Should Read This Book?
Section . How This Book anized
Section . What Are You Protecting?
Section . Who Are Your Enemies?
Section . What They Hope to plish
Section . Costs: Protection versus Break-Ins
Section . Protecting Hardware
Section . work and Modem Access
Section . Protecting System Access
Section . Protecting Files
Section . Preparing for and Detecting an Intrusion
Section . Recovering from an Intrusion

Part 1: Securing Your System
Chapter 2. Quick Fixes mon Problems
Section . Understanding Linux Security
Section . The Seven Most Deadly Sins
Section . Passwords—A Key Point for Good Security
Section . Advanced Password Techniques
Section . Protecting the System from User Mistakes
Section . Forgiveness Is Better Than Permission
Section . Dangers and Countermeasures During Initial System Setup
Section . Limiting Unreasonable Access
Section . Firewalls and the Corporate Moat
Section . Turn Off Unneeded Services
Section . High Security Requires Minimum Services
Section . Replace These Weak Doors with Brick
Section . New Lamps for Old
Section . United We Fall, Divided We Stand

Chapter 3. Quick and Easy Break-Ins and How to Avoid Them
Section . X Marks the Hole
Section . Physical Intrusions
Section . Selected Short Subjects
Section . Terminal Device Attacks
Section . Disk Sniffing

Chapter 4. Common Break-Ins by Subsystem
Section . NFS, mountd, and portmap
Section . Sendmail
Section .
Section . FTP
Section . The rsh, rcp, rexec, and rlogin Services
Section