By Simson Garfinkel, Gene Spafford, Alan Schwartz
When Practical Unix Security used to be first released greater than a decade in the past, it grew to become an fast vintage. full of information regarding host defense, it stored many a Unix procedure administrator from catastrophe. the second one variation additional much-needed net protection assurance and doubled the dimensions of the unique quantity. The 3rd version is a finished replace of this very hot booklet - a better half for the Unix/Linux method administrator who must safe his or her organization's process, networks, and net presence in an more and more opposed world.
Focusing at the 4 most well liked Unix variations today--Solaris, Mac OS X, Linux, and FreeBSD--this booklet comprises new info on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft applied sciences, embedded structures, instant and computer matters, forensics, intrusion detection, chroot jails, cell scanners and firewalls, digital and cryptographic filesystems, WebNFS, kernel safety degrees, outsourcing, criminal concerns, new web protocols and cryptographic algorithms, and masses more.
Practical Unix & net Security involves six parts:
machine protection fundamentals: advent to safety difficulties and ideas, Unix heritage and lineage, and the significance of defense rules as a easy section of process protection.
safety construction blocks: basics of Unix passwords, clients, teams, the Unix filesystem, cryptography, actual protection, and body of workers safeguard.
community safety: an in depth examine modem and dialup safeguard, TCP/IP, securing person community companies, Sun's RPC, quite a few host and community authentication platforms (e.g., NIS, NIS+, and Kerberos), NFS and different filesystems, and the significance of safe programming.
safe operations: maintaining thus far in today's altering safety international, backups, protecting opposed to assaults, appearing integrity administration, and auditing.
dealing with defense incidents: studying a break-in, facing programmed threats and denial of carrier assaults, and criminal points of desktop safety.
Appendixes: a finished defense list and a close bibliography of paper and digital references for extra studying and research.
Packed with a thousand pages of worthy textual content, scripts, checklists, suggestions, and warnings, this 3rd version is still the definitive reference for Unix directors and someone who cares approximately keeping their platforms and information from today's threats.