Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Linux System Security: The Administrator' s Guide to Open Source Security Tools
US $9.29
Approximately£6.86
Condition:
Good
A book that has been read, but is in good condition. Minimal damage to the book cover eg. scuff marks, but no holes or tears. If this is a hard cover, the dust jacket may be missing. Binding has minimal wear. The majority of pages are undamaged with some creasing or tearing, and pencil underlining of text, but this is minimal. No highlighting of text, no writing in the margins, and no missing pages. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
Free USPS Media MailTM.
Located in: Boston, Massachusetts, United States
Delivery:
Estimated between Sat, 26 Jul and Fri, 1 Aug to 94104
Returns:
30 days return. Seller pays for return postage.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:306019984832
All net proceeds will support More Than Words Inc.
- Official eBay for Charity listing. Learn more
- This sale benefits a verified non-profit partner.
Item specifics
- Condition
- Book Title
- Linux System Security: The Administrator's Guide to Open Source S
- Narrative Type
- Nonfiction
- Intended Audience
- Adult
- Inscribed
- NO
- ISBN
- 9780130158079
About this product
Product Identifiers
Publisher
Prentice Hall PTR
ISBN-10
0130158070
ISBN-13
9780130158079
eBay Product ID (ePID)
1614057
Product Key Features
Number of Pages
604 Pages
Publication Name
Linux System Security : the Administrator's Guide to Open Source Security Tools
Language
English
Subject
Operating Systems / Unix, Operating Systems / Linux, Security / General
Publication Year
1999
Type
Textbook
Subject Area
Computers
Series
Prentice-Hall Series in Computer Networking and Distributed Systems
Format
Hardcover
Dimensions
Item Height
1.7 in
Item Weight
46.3 Oz
Item Length
9.5 in
Item Width
7.2 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
99-059100
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
1. Vulnerability Survey. What Happened? Other Cracker Activities. So, Are You Going to Show Us How to Break into Systems? A Survey of Vulnerabilities and Attacks. Technical. Social. Physical. Summary. For Further Reading. Books. Interesting Cracker Tales. Web Sites. Full-Disclosure Resources. 2. Security Policies. What Is Computer and Network Security? Elements of a Computing Environment. Risk Analysis. The Security Policy. Securing Computers and Networks. User Privacy and Administrator Ethics. Summary. For Further Reading. Books. Web Resources. Other Resources. 3. Background Information. BIOS Passwords. Linux Installation and LILO. A Note about LILO. Recovering a Corrupt System. Installation and LILO Resources. Start-Up Scripts. Red Hat Package Manager. Verifying Packages with RPM. Checking PGP Signatures with RPM. RPM Resources. RPM Mailing List. TCP/IP Networking Overview. The TCP/IP Model Layers. Remote Procedure Call Applications. Trusted Host Files and Related Commands. Some Major Applications. Network Monitoring. General TCP/IP Networking Resources. NFS, Samba, NIS, and DNS Resources. Request for Comment. Cryptography. The Purpose of Cryptography. Algorithm Types. Hash Functions and Digital Signatures. Passwords Aren't Encrypted, They're Hashed! An Overview of PGP. Cryptography References. Testing and Production Environments. Security Archives. Software Testing. Source Code Auditing. Pristine Backups. Security Resources. Licenses. 4. Users, Permissions, and Filesystems. User Account Management. Good Passwords. All Accounts Must Have Passwords!Or Be Locked! Password Aging and the Shadow File. Restricted Accounts. Shell History. The Root Account. Using the Root Account. Multiple Root Users. Minimizing the Impact of Root Compromise. Configuring /etc/securetty. Group Account Management. File and Directory Permissions. User File and Directory Permissions. System File and Directory Permissions. SUID and SGID. File Attributes. Using xlock and xscreensaver. Filesystem Restrictions. Summary. For Further Reading. System Administration. System Security. 5. Pluggable Authentication Modules. PAM Overview. PAM Configuration. PAM Administration. PAM and Passwords. PAM and Passwords Summary. PAM and login. Time and Resource Limits. Access Control with pam_listfile. PAM and su. Using pam_access. Using pam_lastlog. Using pam_rhosts_auth. One-Time Password Support. PAM and the other Configuration File. Additional PAM Options. PAM Logs. Available PAM Modules. PAM-Aware Applications. Important Notes about Configuring PAM. The Future of PAM. Summary. For Further Reading. On-Line Documentation. 6. One-Time Passwords. The Purpose of One-Time Passwords. S/Key. S/Key OTP Overview. S/Key Version 1.1b. S/Key Version. OPIE. Obtaining and Installing OPIE. Implementing and Using OPIE. OPIE and PAM. Obtaining and Installing pam_opie. Obtaining and Installing pam_if. Implementing pam_opie and pam_if. Which OTP System Should I Use? Advantages and Disadvantages of S/Key. Advantages and Disadvantages of OPIE. S/Key and OPIE Vulnerabilities. Summary. For Further Reading. Programming. E-Mail Lists. 7. System Accounting. General System Accounting. Connection Accounting. The last Command. The who Command. One Other Command. Process Accounting. The sa Command. The lastcomm Command. Accounting Files. Summary. For Further Reading. Books. On-Line Documentation. 8. System Logging. The syslog System Logging Utility. Overview. The /etc/syslog.conf File. Invoking the syslogd Daemon. Configuring /etc/syslog.conf. The klogd Daemon. Other Logs. Alternatives to syslog. The auditd Utility. Summary. For Further Reading. General System Logging. Intrusion Detection. 9. Superuser Do (sudo). What Is
Synopsis
-- One of the first Linux security books to cover Bastille, a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised.-- New chapter on network sniffers and port scanners used to detect intruders.-- Updated for Redhat 7.2.As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption; Secure filesystems, email, web servers, and other key applications; Protect mixed Linux/Unix and Windows environments. New to this Edition: Updated for Redhat 7.2; One of the first Linux security books to cover Bastille, a hardening program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised; New chapter on network sniffers and port scanners used to detect intruders; Will Cover Open SSH - the new open sour, For courses in LINUX. This tutorial gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrative concepts and tasks are reviewed only at points where such coverage is absolutely necessary.
LC Classification Number
QA76.76.O63M3515
Item description from the seller
Seller business information
Popular categories from this shop
Seller Feedback (474,066)
- 0***0 (132)- Feedback left by buyer.Past monthVerified purchaseAnother wonderful transaction with this company! I believe this is my 3rd purchase with multiple books in each order and I’ve yet to be disappointed. Books arrived as described - great used condition. Packaging wasn’t great but it’s free shipping and they made it to me intact, so no complaints. The price is unbeatable. Will definitely continue to purchase from them! Highly recommend.
- c***u (4299)- Feedback left by buyer.Past monthVerified purchaseSELLER SHIPS SAFE AND FAST. RECEIVED BOOK DOUBLE WRAPPED SAFE PROTECTED EXACTLY AS DESCRIBED QUICKLY IN PUERTO RICO. THE BEST TERRITORY OF THE UNITED STATES. SELLER IS AN OUTSTANDING WORLD WIDE FIVE STARS EBAYER WITH GREAT CUSTOMER SERVICE E-MAILS COMMUNICATION. BUY WITH CONFIDENCE, SUPPORT EBAYER’S STORE TODAY. GREAT SELLER 100% HIGHLY RECOMMEND ALL THE WAY !
- r***7 (829)- Feedback left by buyer.Past 6 monthsVerified purchaseFantastic Seller. Fast delivery and Expertly packed to ensure the item is safe. Great Communication when asking a question and always polite and to the point. Item received is exactly what was described. Fair price charged and cost was not over the top. So very, very pleased with this Seller I will rate them No.1 and made the experience of buying on EBay a VERY HAPPY one. Thank you so much.Motocross (Action Sports) by (#126762130007)
More to explore:
- Non-Fiction Fiction Books & Security,
- Non-Fiction Security Hardcover Books,
- Non-Fiction Paperback Fiction & Security Books,
- Law Non-Fiction Fiction Books & Security,
- Non-Fiction Fiction Books & Security Ex-Library,
- Non-Fiction Computer Security Fiction & Non-Fiction Books,
- Non-Fiction Security Fiction Books & 1950-1999 Publication Year,
- Study Guide School Textbooks & Study Guides,
- Collins Study Guide School Textbooks & Study Guides,
- Linux Non-Fiction Paperback Fiction & Books