Linux Network Security
by:
Peter G. Smith
On-line Price:
$77.95 (includes GST)
Paperback w/ CD package 541
20%Off Retail Price
You
save: $20.00
TBA. _____________________ N.Sydney : On Order (reserve your copy)
|
Retail Price:
$97.95
Publisher:
CHARLES RIVER MEDIA,31.3.2005
Category:
LINUX Level:
ISBN: 1584503963 ISBN13: 9781584503965
|
Add to Shopping Cart |
Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today*s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security of the entire network needs to be considered rather than just isolated machines. It uses a mix of theory and practical techniques to teach administrators how to install and use security applications, as well as how the applications work and why they are necessary. Starting with the need for security and understanding the problem, the book teaches administrators about packet filtering (firewalling) with iptables, hardening services such as Apache, BIND, Sendmail, FTP, and MySQL to prevent attacks, network analysis, encryption, local security, DoS attacks, and rootkits. Auditing networks for potential vulnerabilities and creating secure passwords is also explored. This is the one book that really details how to secure a Linux network.KEY FEATURES Provides a complete guide to finding, fixing, and preventing holes in a Linux network Teaches all the main aspects of securing a small LAN, from routing and topology to configuring UNIX services, with particular emphasis on securing against remote attack Teaches how a Linux firewall can be used to protect desktop systems inside the LAN from viruses, spam, and hackers Includes a CD-ROM with various open source software that will allow administrators to implement the techniques from the book and begin securing their networks immediately ON THE CD (see Appendix F for more details) SOFTWARE Includes John The Ripper password cracker, Ettercap, Nmap port scanner, Nessus vulnerability scanner, Nikto vulnerability scanner, LibSafe stack protection library, TripWire IDS, and Snort 2.2.0 IDS and packet sniffer LINKS Hyperlinks to all the URLs mentioned in the book FIGURES All the images used in the book AUTHOR BIO Peter G. Smith is a programmer and system administrator from the UK. Having originally started as a web developer with an interest in CSS, MySQL, and PHP, he now works exclusively on UNIX platforms, mostly writing Perl. He is an advocate of the Open Source movement and has contributed various documentation and programs over the years, as well as writing articles for various on-line publications. SYSTEM REQUIREMENTS UNIX/Linux: Linux operating system with a 2.4 or 2.6 (recommended) kernel; Pentium I processor, or equivalent; 64MB RAM (128MB or more recommended); CDROM drive; X Windows, optional; 80MB available hard disk space; Perl interpreter; GCC 2.96 or greater; WINDOWS: Windows 98, NT, or greater; Pentium I processor, or equivalent; 128MB RAM; CD-ROM drive; 80MB free hard disk space; Perl interpreter; C compiler
|