買這商品的人也買了...
-
$580$458 -
$880$695 -
$650$514 -
$590$466 -
$550$435 -
$1,232Linux Security Cookbook (Paperback)
-
$750$638 -
$560$476 -
$850$723 -
$750$593 -
$780$616 -
$1,176Computer Organization and Design: The Hardware/Software Interface, 3/e(IE) (美國版ISBN:1558606041)
-
$650$618 -
$650$514 -
$650$507 -
$450$383 -
$680$537 -
$1,250$1,225 -
$790$672 -
$1,890$1,796 -
$704GDB Pocket Reference (Paperback)
-
$650$507 -
$400$360 -
$780$741 -
$400$340
商品描述
Description:
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.
This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell.
Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic.
A number of new security topics have been added for this edition, including:
- Database security, with a focus on MySQL
- Using OpenLDAP for authentication
- An introduction to email encryption
- The Cyrus IMAP service, a popular mail delivery agent
- The vsftpd FTP server
Geared toward Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Linux Server Security with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages on several popular distributions. With this book in hand, you'll have both the expertise and the tools to comprehensively secure your Linux system.
Table of Contents:
Preface
1. Threat Modeling and Risk Management
Components of Risk
Simple Risk Analysis: ALEs
An Alternative: Attack Trees
Defenses
Conclusion
Resources
2. Designing Perimeter Networks
Some Terminology
Types of Firewall and DMZ Architectures
Deciding What Should Reside on the DMZ
Allocating Resources in the DMZ
The Firewall
3. Hardening Linux and Using iptables
OS Hardening Principles
Automated Hardening with Bastille Linux
4. Secure Remote Administration
Why It's Time to Retire Cleartext Admin Tools
Secure Shell Background and Basic Use
Intermediate and Advanced SSH
5. OpenSSL and Stunnel
Stunnel and OpenSSL: Concepts
6. Securing Domain Name Services (DNS)
DNS Basics
DNS Security Principles
Selecting a DNS Software Package
Securing BIND
djbdns
Resources
7. Using LDAP for Authentication
LDAP Basics
Setting Up the Server
LDAP Database Management
Conclusions
Resources
8. Database Security
Types of Security Problems
Server Location
Server Installation
Database Operation
Resources
9. Securing Internet Email
Background: MTA and SMTP Security
Using SMTP Commands to Troubleshoot and Test SMTP Servers
Securing Your MTA
Sendmail
Postfix
Mail Delivery Agents
A Brief Introduction to Email Encryption
Resources
10. Securing Web Servers
Web Security
The Web Server
Web Content
Web Applications
Layers of Defense
Resources
11. Securing File Services
FTP Security
Other File-Sharing Methods
Resources
12. System Log Management and Monitoring
syslog
Syslog-ng
Testing System Logging with logger
Managing System Logfiles with logrotate
Using Swatch for Automated Log Monitoring
Some Simple Log-Reporting Tools
Resources
13. Simple Intrusion Detection Techniques
Principles of Intrusion Detection Systems
Using Tripwire
Other Integrity Checkers
Snort
Resources
Appendix:. Two Complete iptables Startup Scripts
Index
商品描述(中文翻譯)
**描述:**
Linux 一直在熱門網路伺服器的名單中名列前茅,無論是用於網頁、匿名 FTP,或是一般服務如 DNS 和郵件傳遞。然而,安全性是提供這類服務的首要考量。任何伺服器每天都會遭遇數十次的隨意探測嘗試,並且也會有一定頻率的嚴重入侵嘗試。
這本備受推崇的書籍,最初名為《Building Secure Servers with Linux》,結合了實用建議與確保安全所需的技術工具的堅實知識。該書專注於 Linux 的最常見用途——作為提供服務的中心,無論是對組織還是互聯網,並向讀者展示如何加固其主機以抵禦攻擊。《Linux Server Security》是希望加固系統的 Linux 使用者的全方位資源,涵蓋了入侵檢測和防火牆等一般安全性,以及 DNS、Apache 網頁伺服器、郵件和安全外殼等關鍵服務。
作者 Michael D. Bauer 是一位安全顧問、網路架構師,也是《Linux Journal》中受歡迎的 Paranoid Penguin 專欄的主筆,他仔細概述了安全風險,定義了可以最小化這些風險的預防措施,並提供了強健安全的配方。他在幾個章節中與管理員和開發者 Bill Lubanovic 共同合作。
本版新增了多個安全主題,包括:
- 數據庫安全,重點在 MySQL
- 使用 OpenLDAP 進行身份驗證
- 電子郵件加密簡介
- Cyrus IMAP 服務,一個流行的郵件傳遞代理
- vsftpd FTP 伺服器
本書針對對安全專業知識不多的 Linux 使用者,作者以清晰的語言解釋安全概念和技術,從基礎開始。《Linux Server Security》提供了超越特定軟體包和版本號的「大局」原則的獨特平衡,以及在幾個流行發行版上加固這些軟體包的非常清晰的程序。手握此書,您將擁有全面加固 Linux 系統所需的專業知識和工具。
**目錄:**
**前言**
**1. 威脅建模與風險管理**
- 風險的組成部分
- 簡單風險分析:ALEs
- 替代方案:攻擊樹
- 防禦措施
- 結論
- 資源
**2. 設計邊界網路**
- 一些術語
- 防火牆和 DMZ 架構類型
- 決定 DMZ 上應該存在的內容
- 在 DMZ 中分配資源
- 防火牆
**3. 加固 Linux 和使用 iptables**
- 作業系統加固原則
- 使用 Bastille Linux 進行自動化加固
**4. 安全的遠端管理**
- 為什麼是時候淘汰明文管理工具
- 安全外殼的背景和基本使用
- 中級和高級 SSH
**5. OpenSSL 和 Stunnel**
- Stunnel 和 OpenSSL:概念
**6. 保護域名服務 (DNS)**
- DNS 基礎
- DNS 安全原則
- 選擇 DNS 軟體包
- 加固 BIND
- djbdns
- 資源
**7. 使用 LDAP 進行身份驗證**
- LDAP 基礎
- 設置伺服器
- LDAP 數據庫管理
- 結論
- 資源
**8. 數據庫安全**
- 安全問題類型
- 伺服器位置
- 伺服器安裝
- 數據庫操作
- 資源
**9. 保護互聯網電子郵件**
- 背景:MTA 和 SMTP 安全
- 使用 SMTP 命令進行故障排除和測試 SMTP 伺服器
- 加固您的 MTA
- Sendmail
- Postfix
- 郵件傳遞代理
- 電子郵件加密簡介
- 資源
**10. 保護網頁伺服器**
- 網頁安全
- 網頁伺服器
- 網頁內容
- 網頁應用程式
- 防禦層
- 資源
**11. 保護檔案服務**
- FTP 安全
- 其他檔案共享方法
- 資源
**12. 系統日誌管理與監控**
- syslog
- Syslog-ng
- 使用 logger 測試系統日誌
- 使用 logrotate 管理系統日誌檔
- 使用 Swatch 進行自動化日誌監控
- 一些簡單的日誌報告工具
- 資源
**13. 簡單的入侵檢測技術**
- 入侵檢測系統原則
- 使用 Tripwire
- 其他完整性檢查工具
- Snort
- 資源
**附錄:兩個完整的 iptables 啟動腳本**
**索引**