Description

Book Synopsis
Conveys to administrators and developers the tricks of the trade that can help them avoid serious security breaches. It covers both background theory and practical step-by-step instructions for protecting a server that runs Linux.

Table of Contents
Preface 1. Threat Modeling and Risk Management Components of Risk Simple Risk Analysis: ALEs An Alternative: Attack Trees; Defenses Conclusion Resources 2. Designing Perimeter Networks Some Terminology Types of Firewall and DMZ Architectures Deciding What Should Reside on the DMZ Allocating Resources in the DMZ The Firewall 3. Hardening Linux and Using iptables OS Hardening Principles Automated Hardening with Bastille Linux 4. Secure Remote Administration Why It's Time to Retire Cleartext Admin Tools Secure Shell Background and Basic Use Intermediate and Advanced SSH 5. OpenSSL and Stunnel; Stunnel and OpenSSL: Concepts 6. Securing Domain Name Services (DNS) DNS Basics DNS Security Principles Selecting a DNS Software Package Securing BIND djbdns Resources; 7. Using LDAP for Authentication LDAP Basics Setting Up the Server LDAP Database Management Conclusions Resources; 8. Database Security Types of Security Problems Server Location Server Installation Database Operation; Resources 9. Securing Internet Email Background: MTA and SMTP Security Using SMTP Commands to Troubleshoot and Test SMTP Servers; Securing Your MTA Sendmail Postfix Mail Delivery Agents; A Brief Introduction to Email Encryption Resources 10. Securing Web Servers Web Security The Web Server Web Content; Web Applications Layers of Defense Resources 11. Securing File Services FTP Security Other File-Sharing Methods; Resources 12. System Log Management and Monitoring syslog; Syslog-ng Testing System Logging with logger Managing System Logfiles with logrotate Using Swatch for Automated Log Monitoring; Some Simple Log-Reporting Tools Resources 13. Simple Intrusion Detection Techniques Principles of Intrusion Detection Systems; Using Tripwire Other Integrity Checkers Snort Resources Appendix:. Two Complete iptables Startup Scripts Index

Linux Server Security

Product form

£26.99

Includes FREE delivery

RRP £35.99 – you save £9.00 (25%)

Order before 4pm today for delivery by Wed 14 Jan 2026.

A Paperback / softback by Michael Bauer

Out of stock


    View other formats and editions of Linux Server Security by Michael Bauer

    Publisher: O'Reilly Media
    Publication Date: 22/02/2005
    ISBN13: 9780596006709, 978-0596006709
    ISBN10: 0596006705

    Description

    Book Synopsis
    Conveys to administrators and developers the tricks of the trade that can help them avoid serious security breaches. It covers both background theory and practical step-by-step instructions for protecting a server that runs Linux.

    Table of Contents
    Preface 1. Threat Modeling and Risk Management Components of Risk Simple Risk Analysis: ALEs An Alternative: Attack Trees; Defenses Conclusion Resources 2. Designing Perimeter Networks Some Terminology Types of Firewall and DMZ Architectures Deciding What Should Reside on the DMZ Allocating Resources in the DMZ The Firewall 3. Hardening Linux and Using iptables OS Hardening Principles Automated Hardening with Bastille Linux 4. Secure Remote Administration Why It's Time to Retire Cleartext Admin Tools Secure Shell Background and Basic Use Intermediate and Advanced SSH 5. OpenSSL and Stunnel; Stunnel and OpenSSL: Concepts 6. Securing Domain Name Services (DNS) DNS Basics DNS Security Principles Selecting a DNS Software Package Securing BIND djbdns Resources; 7. Using LDAP for Authentication LDAP Basics Setting Up the Server LDAP Database Management Conclusions Resources; 8. Database Security Types of Security Problems Server Location Server Installation Database Operation; Resources 9. Securing Internet Email Background: MTA and SMTP Security Using SMTP Commands to Troubleshoot and Test SMTP Servers; Securing Your MTA Sendmail Postfix Mail Delivery Agents; A Brief Introduction to Email Encryption Resources 10. Securing Web Servers Web Security The Web Server Web Content; Web Applications Layers of Defense Resources 11. Securing File Services FTP Security Other File-Sharing Methods; Resources 12. System Log Management and Monitoring syslog; Syslog-ng Testing System Logging with logger Managing System Logfiles with logrotate Using Swatch for Automated Log Monitoring; Some Simple Log-Reporting Tools Resources 13. Simple Intrusion Detection Techniques Principles of Intrusion Detection Systems; Using Tripwire Other Integrity Checkers Snort Resources Appendix:. Two Complete iptables Startup Scripts Index

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account