Toggle navigation
Home
Linux systems
Secure Linux-based Servers
Building Secure Servers with Linux
Preface
What This Book Is About
The Paranoid Penguin Connection
Audience
What This Book Doesn't Cover
Assumptions This Book Makes
Conventions Used in This Book
Request for Comments
Acknowledgments
Chapter 1. Threat Modeling and Risk Management
Section 1.1. Components of Risk
Section 1.2. Simple Risk Analysis: ALEs
Section 1.3. An Alternative: Attack Trees
Section 1.4. Defenses
Section 1.5. Conclusion
Section 1.6. Resources
Chapter 2. Designing Perimeter Networks
Section 2.1. Some Terminology
Section 2.2. Types of Firewall and DMZ Architectures
Section 2.3. Deciding What Should Reside on the DMZ
Section 2.4. Allocating Resources in the DMZ
Section 2.5. The Firewall
Chapter 3. Hardening Linux
Section 3.1. OS Hardening Principles
Section 3.2. Automated Hardening with Bastille Linux
Chapter 4. Secure Remote Administration
Section 4.1. Why It's Time to Retire Clear-Text Admin Tools
Section 4.2. Secure Shell Background and Basic Use
Section 4.3. Intermediate and Advanced SSH
Section 4.4. Other Handy Tools
Chapter 5. Tunneling
Section 5.1. Stunnel and OpenSSL: Concepts
Chapter 6. Securing Domain Name Services (DNS)
Section 6.1. DNS Basics
Section 6.2. DNS Security Principles
Section 6.3. Selecting a DNS Software Package
Section 6.4. Securing BIND
Section 6.5. djbdns
Section 6.6. Resources
Chapter 7. Securing Internet Email
Section 7.1. Background: MTA and SMTP Security
Section 7.2. Using SMTP Commands to Troubleshoot and Test SMTP Servers
Section 7.3. Securing Your MTA
Section 7.4. Sendmail
Section 7.5. Postfix
Section 7.6. Resources
Chapter 8. Securing Web Services
Section 8.1. Web Server Security
Section 8.2. Build Time: Installing Apache
Section 8.3. Setup Time: Configuring Apache
Section 8.4. Runtime: Securing CGI Scripts
Section 8.5. Special Topics
Section 8.6. Other Servers and Web Security
Chapter 9. Securing File Services
Section 9.1. FTP Security
Section 9.2. Other File-Sharing Methods
Section 9.3. Resources
Chapter 10. System Log Management and Monitoring
Section 10.1. syslog
Section 10.2. Syslog-ng
Section 10.3. Testing System Logging with logger
Section 10.4. Managing System-Log Files
Section 10.5. Using Swatch for Automated Log Monitoring
Section 10.6. Resources
Chapter 11. Simple Intrusion Detection Techniques
Section 11.1. Principles of Intrusion Detection Systems
Section 11.2. Using Tripwire
Section 11.3. Other Integrity Checkers
Section 11.4. Snort
Section 11.5. Resources
Appendix A. Two Complete Iptables Startup Scripts
Colophon
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.