Cover image for Linux Security.
Linux Security.
Title:
Linux Security.
Author:
Siddiqui, Shadab.
Personal Author:
Physical Description:
1 online resource (512 pages)
Contents:
Contents -- Introduction -- How to Use This Book -- Chapter 1 Linux: An Overview -- Origin of Linux -- Advantages -- Linux Architecture -- Linux - Open Source -- Linux: A Server -- FTP -- SNMP -- HTTP Protocol -- POP Protocol -- SMTP Protocol -- Telnet Protocol -- SSH Protocol -- NNTP -- Networking Support in Linux -- Linux on a Desktop -- Linux as a Development Platform -- Summary -- Chapter 2 Linux Security: An Overview -- Need for Security -- Physical Security -- Common Precautions for Physical Safety -- Computer Locks -- BIOS Security -- Boot Loader Security -- xlock and vlock -- Detecting Physical Security Compromises -- Data Security -- Secure Data Deletion -- Data Encryption -- Network Security -- Firewalls -- Prevent Spoofing -- Secure Protocols -- FTP Security -- Modem Security -- Windows Clients -- Network Monitoring -- Disable Unnecessary and Unauthorized Services -- Domain Name Service Security -- Network Information Service -- Account Security -- Password Security -- Guest Accounts -- User Accounts -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 3 Linux Distributions and Installation -- Linux Distributions -- Red Hat -- MandrakeSoft -- Caldera -- Debian -- SuSE -- Installing Red Hat Linux -- CD-ROM Installation -- NFS Installation -- Hard Drive Installation -- FTP Installation -- Customizing FTP, NFS, or Hard Drive Installation -- Verifying Package Integrities -- Trojan Infected CDs/Distributions -- Automated Installation: Kickstart -- The config File -- Packages to Install -- Post-Installation Shell Commands -- Linux Installation from Kickstart -- Mounting boot/supp Disks -- Linux Partitions -- Resizing Current Partitions -- Boot Loader Installation -- Master Boot Record (MBR) -- The First Sector of the Root Partition -- GRUB.

LILO -- SMP Motherboards -- Linux File Systems -- Introduction to the Linux File System -- /dev(Devices) -- /lib (System Libraries) -- /sbin (System Admin Binaries) -- /bin (Useful Binaries) -- /etc (System Configuration) -- /proc (Linux Profiling & Tuning) -- /tmp (Temporary Storage) -- /var (Variable File Storage) -- /root and /home/user (Home Directories) -- /mnt (Temporary Mount Point) -- /lost+found (Lost and Found) -- /usr (Applications) -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Answers -- Multiple Choice Answers -- Chapter 4 Linux Administration -- General Administration -- Searching for Information -- System Diagnostics -- Process Control -- User Management -- Daemon Control -- Linuxconf -- RedHat Package Manager -- Administration Utilities -- YaST -- Sudo -- Super -- Remote Administration -- VNC -- Webmin -- cfengine -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 5 Encryption and Authentication -- Encryption -- Single Key Cryptography -- Public Key Cryptography -- Hashing Functions -- Message Digest -- LDAP -- Password Suite -- Shadow Suite -- Shadow Suite Versions -- Shadow Suite Content -- Installing Shadow Suite -- Pluggable Authentication Modules (PAM) -- The /etc/pam.conf File -- Kerberos -- Kerberos Principal -- Ticket Management -- Password Management -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Questions -- Short Answers -- Chapter 6 Network Basics -- Open Systems Interconnection (OSI) -- Physical Layer -- Data Link Layer -- Network Layer -- Transport Layer -- Session Layer and Presentation Layer -- Application Layer -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers.

Multiple Choice Answers -- Short Answers -- Chapter 7 Network Attacks -- Definition of an Attack -- Who Is an Attacker? -- Motives behind an Attack -- Types of Attacks -- Internal Attacks -- External or Network Attacks -- E-Mail Bombing and Spamming -- Tools Used for Attacking Networks -- Trinoo -- Tribe Flood Network (TFN) -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Answers -- Multiple Choice Answers -- Chapter 8 Apache Web Server -- The httpd Daemon -- suEXEC -- The httpd.conf File -- Directives -- Layout of the httpd.conf File -- Apache Modules -- Virtual Hosts -- IP-based Virtual Hosts -- Configuring the Virtual Hosts -- Name-based Virtual Hosts -- Directory Access Control -- .htaccess File -- Working of .htaccess -- Directives in .htaccess File -- Digest Authentication -- CGI Security -- The cgi-bin Directory -- CGI Applications versus CGI Scripts -- Securing Apache Server -- Securing Server Side Includes -- Default Access -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 9 Other Network Servers -- FTP Server -- Setting the FTP User Account -- Configurations File for FTP Server -- FTP Administrative Tools -- Anonymous FTP -- Configuring Anonymous FTP -- Securing FTP -- Sendmail -- Configuration Files -- Sendmail Security -- Domain Name Service -- IP Addresses -- Domain Name Space -- Services Offered By a DNS Server -- Components of DNS -- DNS Transactions -- BIND -- BIND Installation -- Starting and Stopping BIND -- BIND Configuration -- nslookup -- BIND Security -- SAMBA -- SAMBA Services -- SAMBA Servers -- SMB Protocol -- SAMBA Installation -- SAMBA Configuration -- Printer Sharing -- Mounting the SMB File System -- SAMBA Client Tools -- SAMBA Security -- Summary -- Check Your Understanding.

Multiple Choice Questions -- Answers -- Multiple Choice Answers -- Chapter 10 Linux Network Defense and Intrusion Detection -- Linux Services and Monitoring -- Netstat -- ps -- lsof -- Secure Protocols -- SSL -- SSH -- Data Security -- Network Security -- Intrusion Detection -- General Indications of Intrusion -- General Methods for Detecting Intrusions -- Intrusion Detection Tools -- Network Security Tools -- Snort -- nmap -- SpiderMap -- Firewalk -- Firewalls -- ipchains -- IPtables -- TCP Wrappers -- Routing Security -- routed -- GateD -- MRT -- Zebra -- Linux Security Checklist -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 11 The Linux Kernel -- Modules -- Building Kernel -- Preparing to Build a Kernel -- Selecting Modules -- Building the Kernel -- Recompiling Kernel -- Kernel Security -- Applying Kernel Patches -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 12 System Logs -- What Are Log Files? -- Important Log Files -- General System Logs -- Log Filtering -- Tools for Managing Log Files -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Chapter 13 System Backups -- Overview -- Types of Backups -- Backup Media -- Automating Backups - Cron -- Backup Tools -- Non-Commercial Backup Tools -- Commercial Backup Tools -- Summary -- Check Your Understanding -- Multiple Choice Questions -- Short Questions -- Answers -- Multiple Choice Answers -- Short Answers -- Appendix A: Linux-Best Practices -- Linux Partitions -- The/home Directory -- General Best Practices -- Stop All Unused Services -- Use Secure Protocols for Remote Administration.

Choosing Your Passwords -- Regular Updates -- Make Backups -- Enable Shadow Suite -- BIND -- Sendmail -- Appendix B: Linux FAQs -- Appendix C: Future of Linux -- Bastille Linux -- Features of Bastille Linux -- Apache 2.0 -- New Modules in Apache 2.0 -- Enhanced Modules -- qmail -- sendmail vs. qmail -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q-R -- S -- T -- U -- V -- W -- X-Z.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: