Ebook Free Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
Considering guide Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes to read is additionally needed. You could choose guide based on the preferred styles that you like. It will certainly involve you to enjoy reviewing other books Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes It can be likewise concerning the necessity that binds you to read the book. As this Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes, you can discover it as your reading publication, also your favourite reading publication. So, discover your preferred book right here and also obtain the connect to download and install guide soft documents.
Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
Ebook Free Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes. Change your routine to hang or squander the moment to only talk with your friends. It is done by your everyday, do not you really feel bored? Currently, we will certainly reveal you the brand-new routine that, in fact it's a very old routine to do that can make your life much more certified. When feeling burnt out of consistently talking with your good friends all leisure time, you can locate the book qualify Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes and after that read it.
If you ally require such a referred Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes publication that will certainly give you worth, obtain the most effective seller from us currently from several popular publishers. If you want to enjoyable publications, several books, tale, jokes, as well as much more fictions compilations are likewise released, from best seller to one of the most current released. You might not be perplexed to enjoy all book collections Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes that we will certainly supply. It is not regarding the rates. It has to do with what you need now. This Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes, as one of the very best vendors right here will be one of the ideal choices to check out.
Discovering the appropriate Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes publication as the best necessity is sort of lucks to have. To begin your day or to finish your day during the night, this Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes will certainly be proper enough. You could merely search for the floor tile right here as well as you will obtain guide Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes referred. It will certainly not trouble you to reduce your valuable time to opt for purchasing book in store. By doing this, you will certainly also spend money to spend for transportation and other time spent.
By downloading the on the internet Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes book here, you will get some benefits not to go for the book store. Simply link to the internet and also start to download and install the web page link we share. Now, your Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes is ready to appreciate reading. This is your time as well as your calmness to acquire all that you want from this publication Linux Security Cookbook, By Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are:
- Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more
- Monitoring your network with tcpdump, dsniff, netstat, and other tools
- Protecting network connections with Secure Shell (SSH) and stunnel
- Safeguarding email sessions with Secure Sockets Layer (SSL)
- Encrypting files and email messages with GnuPG
- Probing your own security with password crackers, nmap, and handy scripts
- Sales Rank: #787241 in Books
- Brand: Brand: O'Reilly Media
- Published on: 2003-06
- Released on: 2003-06-09
- Original language: English
- Number of items: 1
- Dimensions: 9.19" h x .89" w x 7.00" l, 1.17 pounds
- Binding: Paperback
- 352 pages
- Used Book in Good Condition
Review
"I really enjoyed this book. I think my machine is more secure than before I read this book. The advice is good and pitched at, for me, the right level. References were up-to-date ad far as I could see. I would certainly recommend this book to anyone wanting to secure, or test the esisting security, of a Linux system." - Mick Farmer, Linux Security Cookbook - news@UK, September 2003
About the Author
Dan Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He has written several O'Reilly books, as well as monthly columns for Compute! and Keyboard Magazine. Dan and his family reside in Boston.
Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He is the co-author of SSH, The Secure Shell: The Definitive Guide.
Most helpful customer reviews
23 of 24 people found the following review helpful.
Good book for quick reference...
By foobar
I read this book from cover to cover and consider it a great effort by the authors to cover many security issues related to not just Linux, but most *nix operating systems. Here's a chapter by chapter review of what I've observed in the book:
Chapter 1 - System Snapshots with Tripwire
I liked the discussion of Tripwire and its configuration options. The sections on "Ultra-Paranoid Integrity Checking" were great! A decent introduction to Tripwire and some of its features.
Chapter 2 - Firewalls with iptables and ipchains
The difference between "Drop versus Reject" targets was good. So many books have info on iptables, but none discusses these issues. Also the point made about dropping ICMP messages was good. Quick to learn and implement recipes presented in this chapter.
Chapter 3 - Restricting Access by Remote Users
Recipe 3.7 was very neat. Allowing users to access a service only by port-forwarding over ssh allows the administrator to restrict access by user names. A smart way of imposing restrictions!
Also, in recipe 3.9, I liked the authors' approach to finding if xinetd is compiled with libwrap support.
All recipes regarding tweaking xinetd were good. It isn't always possible to look at all the configurable options with xinetd, and the authors did a good job in mentioning a few useful options.
Chapter 4 - Authentication Techniques and Infrastructures
Quick tips with PAM, openssl and kerberos. I couldnt get some of the recipes to work on my machine, but got most openssl stuff to work.
Chapter 5 - Authorization Controls
I liked this chapter the best. The discussion on sudo was enlightening, and I was able to effectively tweak most recipes to my needs. The man page would never have provided me with such a good explanation. Thanks to the authors for this chapter.
Chapter 6 - Protecting Outgoing Network Connections
Two of these authors had written the snail book and I expected nothing less than a very useful recipe session on SSH. The most useful recipe here was setting up public key authentication between an openssh client and an ssh.com server and vice-versa. I had always wanted to do this but didnt have a clue until I read these recipes. All recipes have strong technical content and are well written. The recipe on running cron jobs with ssh was
amazing. The authors teach how to be creative, rather than merely
explaining facts and methodologies.
Chapter 7 - Protecting Files
I liked all recipes on GnuPG especially neat hacks like maintaining encrypted files with vim, encrypting backups etc..
Chapter 8 - Protecting Email
I tried out a few recipes and got them to work with my configuration. Pretty impressive stuff! The difference between SSL and STARTTLS daemons was very well explained. I havent seen a consolidated discussion on this topic thus far and was really happy to see things explained clearly in just one sidebar. I couldn't get the imap/ssl recipe working for my settings, inspite of spending quite some time. Perhaps a few screen-shots
made available via the website would've been of greatest help..
Chapter 9 - Testing and Monitoring
Recipes on Cracklib, using find for setuid/setgid files and the discussion on the 'find' command are very well written. Though this stuff has been mentioned in most security books/magazines, a consolidated treatment here is nice to note. nmap truly deserved the long section and I was able to learn a few facts I didnt know about nmap until now. The recipe on examining local network activities covered the best tools in business -
netstat, lsof and rpcinfo. Sniffing network traffic, using tcpdump, ethereal and dsniff provide a good refresher and ready-to-use recipes.
Overall, Linux Security Cookbook is a very useful book for quick
reference. It covers a wide range of security topics and issues related to not just Linux but most Unices. The recipes provided here are well written and ready to use. I have found many tips related to sudo, SSH, xinetd, encryption and network security extremely useful. Full credit to the authors for bringing out such a comprehensive book on Linux Security.
8 of 8 people found the following review helpful.
Great springboard for Linux security
By A Customer
As the title suggests, LSC is a series of different Linux security "recipes." I found the cookbook-style of presentation both good and bad. Some recipes were a breeze to follow (such as the gpg recipes). Other recipes were difficult, but not impossible to follow.
As a "desktop" Linux user who only administers a desktop machine and notebook the chapters I found most useful were those on intrusion detection systems (Chapter 1) and GPG (Chapters 7 & 8). That said, LSC contains dozens of useful recipes for administrators from PAM authentication to monitoring who is doing what on your system. Some of the programs covered are programs I've never heard of before, John the Ripper for example. Other recipes cover those programs I know I should check out, like Snort, but have never taken the time to.
LSC is for the most part very easy to follow. The authors have been very careful to mention when software (snort for example) might or might not be included and how to find and install it. I got tripped up a little in the first chapter (which covers tripwire), because I tried downloading and compiling the tripwire source found at the tripwire web site. I obtained the source from a couple of recommended sites. In one instance tripwire failed to compile correctly, in another it compiled but kept segfaulting when I tried to initialize the database. It wasn't until after I emailed O'Reilly that I saw mention further in Chapter 1 that tripwire is included with Red Hat Linux. One of the authors, Daniel J. Barrett, also emailed me to tell me that it was on the third CD - doh! The upside of this little tale is that I got to know aide (another intrusion detection system) a little better after I installed it on my Debian-based notebook.
... it is certainly money well spent. I now use gpg and check my systems for intrusions on a regular basis. I've also finally found a spring board for learning more about Linux security. Reading O'Reilly's LSC made it easier to follow the ipchains-HOWTO and learn more about Linux security from other sources. If you're new to Linux security LSC is a great springboard for learning about a wide range of Linux security issues.
I've saved what is actually covered in LSC for the end of this review. My intention in this review has been mainly to present my experience with LSC so that other Amazon users who are also still desktop users, or have never really been concerned with Linux security issues can take away the fact that despite a few sticking points I found this book to be a great source for information on different Linux security issues. For those concerned with the meat of the book, here's how it breaks down:
1. System Snapshots with Tripwire
2. Firewalls with iptables and ipchains
3. Network Access Control (xinetd, inetd, preventing DOS attacks)
4. Authentication Techniques and Infrastructures (PAM, SSL, Kerberos)
5. Authorization Controls (su and sudo)
6. Protecting Outgoing Network Connections (OpenSSH)
7. Protecting Files (permissions, GPG)
8. Protecting Email (all popular mail user agents, SSL and SSH)
9. Testing and Monitoring (Jack the Ripper, Cracklib, Snort, tcpdump, syslog)
You really need to have a good look at the table of contents to get an idea of all this book covers. I have written about it from a desktop-user standpoint, but there are so many recipes that I couldn't cover everything. There are many great code snippets that more advanced users would find useful.
If you don't have an intrusion detection system, need to grant some of your users limited root privileges, have been using the default firewall rules (or don't have a clue about iptables/ipchains), haven't checked your system for root kits or insecure protocols, then the Linux Security Cookbook should be at the top of your reading list.
4 of 4 people found the following review helpful.
Understandable and concise
By W Boudville
Given the increasing frequency of attacks against computers, by virus writers, spammers and others, any sysadmin needs to pay careful attention to securing your system. All the more so if the computer acts as a server, rather than just a desktop leaf on a network. On the server side, you often have unix or linux systems.
This recent book by OReilly is hence timely. Concise, with a good contents and index. The authors write clearly, in what may be considered a "standard" cookbook style. Each problem is summarised, and a brief but entirely adequate how-to answer is then given. It is part of this style that they do not go into the theory of public/private key encryption, for example. But they readily provide references to fuller discussions on many topics.
Checking the index for comprehensiveness revealed one curious omission. There is no entry for "virus". While it seems like a glaring oversight, I think the authors are correct in doing so. Antivirus software exists, and you would merely have to run it against a set of files. And this software is not usually part of an operating system. Also, most viruses are written for Microsoft desktops. Thus far, linux viruses are actually pretty rare.
The title says "Linux". Actually, if you are running any major unix (Solaris, HPUX...), don't take that title too literally. The problems you face will often be the same as those described here. The solutions will often likewise be the same. Most unixes now have many utilities in common with each other and linux. You may be able to map an answer given here to a similar approach on your machine.
Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes PDF
Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes EPub
Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes Doc
Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes iBooks
Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes rtf
Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes Mobipocket
Linux Security Cookbook, by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes Kindle
Tidak ada komentar:
Posting Komentar