售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
Practical Linux Security Cookbook
Table of Contents
Practical Linux Security Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
eBooks, discount offers, and more
Why Subscribe?
Preface
What this book covers
What you need for this book
Who this book is for
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Conventions
Reader feedback
Customer support
Downloading the example code
Downloading the color images of this book
Errata
Piracy
Questions
1. Linux Security Problems
Introduction
The security policy of Linux
Developing a security policy
Configuring password protection
How to do it…
How it works…
Configuring server security
How to do it…
How it works…
There's more…
Security controls
Conducting integrity checks of the installation medium using checksum
Getting ready
How to do it…
How it works…
See also
Using the LUKS disk encryption
Getting ready
How to do it…
How it works…
Making use of sudoers – configuring sudo access
Getting ready
How to do it…
How it works…
There's more…
Vulnerability assessment
Scanning hosts with Nmap
Getting ready
How to do it…
How it works…
See also
Gaining a root on a vulnerable Linux system
Getting ready
How to do it…
How it works
There's more…
Null or default passwords
IP spoofing
Eavesdropping
Service vulnerabilities
Denial of Service (DoS) attack
2. Configuring a Secure and Optimized Kernel
Introduction
Requirements for building and using a kernel
Creating a USB boot media
Getting ready
How to do it…
How it works…
Retrieving a kernel source
Getting ready
How to do it…
How it works…
Configuring and building a kernel
Getting ready
How to do it…
How it works…
Installing and booting from a kernel
Getting ready
How to do it…
How it works…
Testing and debugging a kernel
Configuring a console for debugging using Netconsole
Getting ready
How to do it…
How it works
There's more…
Debugging a kernel on boot
How to do it…
3. Local Filesystem Security
Viewing file and directory details using the ls command
Getting ready
How to do it…
How it works…
Changing the file permissions using the chmod command
Getting ready
How to do it…
How it works…
There's more...
Implementing access control list (ACL)
Getting ready
How to do it…
There's more…
File handling using the mv command (moving and renaming)
Getting ready…
How it works…
There's more…
Install and configure a basic LDAP server on Ubuntu
Getting ready
How to do it…
How it works…
4. Local Authentication in Linux
User authentication and logging
Getting Started
How to do it...
How it works...
Limiting the login capabilities of users
Getting ready
How to do it...
How it works...
Monitoring user activity using acct
Getting started
How to do it?
How it works...
Login authentication using a USB device and PAM
Getting ready
How to do it…
How it works...
There's more...
Defining user authorization controls
Getting started...
How to do it...
How it works...
5. Remote Authentication
Remote server/host access using SSH
Getting ready
How to do it…
How it works…
Disabling or enabling SSH root login
Getting ready
How to do it…
How it works…
There's more…
Restricting remote access with key-based login into SSH
Getting ready
How to do it...
How it works...
Copying files remotely
Getting ready
How to do it...
How it works...
Setting up a Kerberos server with Ubuntu
Getting ready
How to do it...
How it works...
6. Network Security
Managing the TCP/IP network
Getting ready
How to do it...
How it works...
Using Iptables to configure a firewall
Getting Ready
How to do it...
How it works...
Blocking spoofed addresses
Getting Ready
How to do it...
How it works...
Blocking incoming traffic
Getting Ready
How to do it...
How it works...
Configuring and using the TCP Wrapper
Getting Ready
How to do it?
How it works...
7. Security Tools
Linux sXID
Getting Ready
How to do it...
How it works...
PortSentry
Getting Ready
How to do it?
How it works...
Using Squid proxy
Getting Ready
How to do it...
How it works...
OpenSSL Server
Getting Ready
How to do it...
How it works...
Tripwire
Getting Ready
How to do it...
How it works...
Shorewall
Getting ready
How to do it...
How it works...
8. Linux Security Distros
Kali Linux
Getting ready
How to do it...
How it works...
pfSense
Getting ready
How to do it...
How it works...
DEFT – Digital Evidence and Forensic Toolkit
Getting ready
How to do it...
How it works...
NST – Network Security Toolkit
Getting ready
How to do it...
How it works...
Helix
Getting ready
How to do it?
How it works...
9. Patching a Bash Vulnerability
Understanding the bash vulnerability through Shellshock
Getting Ready
How to do it…
How it works…
Shellshock's security issues
Getting Ready
How to do it…
How it works…
The patch management system
Getting ready
How to do it…
How it works…
Applying patches on the Linux systems
Getting ready
How to do it...
How it works...
10. Security Monitoring and Logging
Viewing and managing log files using Logcheck
Getting ready
How to do it…
How it works…
Monitoring a network using Nmap
Getting ready
How to do it…
How it works…
Using glances for system monitoring
Getting ready
How to do it…
How it works…
Monitoring logs using MultiTail
Getting ready
How to do it…
How it works…
Using system tools – Whowatch
Getting ready
How to do it…
How it works
Using system tools – stat
Getting ready
How to do it…
How it works
Using system tools – lsof
Getting ready
How to do it…
How it works
Using system tools – strace
Getting ready
How to do it…
How it works
Using Lynis
Getting ready
How to do it…
How it works
Index
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜