|Listed in category:
Have one to sell?

Linux System Security: The Administrator's Guide to Open Source Security Tools

MTW Youth
(380491)
Registered as a business seller
US $9.29
Approximately£6.86
Condition:
Good
Breathe easy. Free postage and returns.
People are checking this out. 3 have added this to their Watchlist.
Postage:
Free USPS Media MailTM.
Located in: Boston, Massachusetts, United States
Delivery:
Estimated between Sat, 26 Jul and Fri, 1 Aug to 94104
Estimated delivery dates - opens in a new window or tab reflect seller's dispatch time, origin postcode, destination postcode and time of order receipt, and will depend on the delivery service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods, and are an estimate only.
Returns:
30 days return. Seller pays for return postage.
Payments:
    Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:306019984832
Last updated on 03 Jun, 2025 16:30:33 BSTView all revisionsView all revisions

All net proceeds will support More Than Words Inc.

More Than Words is a nonprofit social enterprise that empowers youth who are in the foster care system, court involved, homeless, or out of school to take charge of their lives by taking charge of a ...
  • Official eBay for Charity listing. Learn more
  • This sale benefits a verified non-profit partner.

Item specifics

Condition
Good: A book that has been read, but is in good condition. Minimal damage to the book cover eg. ...
Book Title
Linux System Security: The Administrator's Guide to Open Source S
Narrative Type
Nonfiction
Intended Audience
Adult
Inscribed
NO
ISBN
9780130158079

About this product

Product Identifiers

Publisher
Prentice Hall PTR
ISBN-10
0130158070
ISBN-13
9780130158079
eBay Product ID (ePID)
1614057

Product Key Features

Number of Pages
604 Pages
Publication Name
Linux System Security : the Administrator's Guide to Open Source Security Tools
Language
English
Subject
Operating Systems / Unix, Operating Systems / Linux, Security / General
Publication Year
1999
Type
Textbook
Author
Scott Mann, Ellen L. Mitchell
Subject Area
Computers
Series
Prentice-Hall Series in Computer Networking and Distributed Systems
Format
Hardcover

Dimensions

Item Height
1.7 in
Item Weight
46.3 Oz
Item Length
9.5 in
Item Width
7.2 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
99-059100
Dewey Edition
21
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
1. Vulnerability Survey. What Happened? Other Cracker Activities. So, Are You Going to Show Us How to Break into Systems? A Survey of Vulnerabilities and Attacks. Technical. Social. Physical. Summary. For Further Reading. Books. Interesting Cracker Tales. Web Sites. Full-Disclosure Resources. 2. Security Policies. What Is Computer and Network Security? Elements of a Computing Environment. Risk Analysis. The Security Policy. Securing Computers and Networks. User Privacy and Administrator Ethics. Summary. For Further Reading. Books. Web Resources. Other Resources. 3. Background Information. BIOS Passwords. Linux Installation and LILO. A Note about LILO. Recovering a Corrupt System. Installation and LILO Resources. Start-Up Scripts. Red Hat Package Manager. Verifying Packages with RPM. Checking PGP Signatures with RPM. RPM Resources. RPM Mailing List. TCP/IP Networking Overview. The TCP/IP Model Layers. Remote Procedure Call Applications. Trusted Host Files and Related Commands. Some Major Applications. Network Monitoring. General TCP/IP Networking Resources. NFS, Samba, NIS, and DNS Resources. Request for Comment. Cryptography. The Purpose of Cryptography. Algorithm Types. Hash Functions and Digital Signatures. Passwords Aren't Encrypted, They're Hashed! An Overview of PGP. Cryptography References. Testing and Production Environments. Security Archives. Software Testing. Source Code Auditing. Pristine Backups. Security Resources. Licenses. 4. Users, Permissions, and Filesystems. User Account Management. Good Passwords. All Accounts Must Have Passwords!Or Be Locked! Password Aging and the Shadow File. Restricted Accounts. Shell History. The Root Account. Using the Root Account. Multiple Root Users. Minimizing the Impact of Root Compromise. Configuring /etc/securetty. Group Account Management. File and Directory Permissions. User File and Directory Permissions. System File and Directory Permissions. SUID and SGID. File Attributes. Using xlock and xscreensaver. Filesystem Restrictions. Summary. For Further Reading. System Administration. System Security. 5. Pluggable Authentication Modules. PAM Overview. PAM Configuration. PAM Administration. PAM and Passwords. PAM and Passwords Summary. PAM and login. Time and Resource Limits. Access Control with pam_listfile. PAM and su. Using pam_access. Using pam_lastlog. Using pam_rhosts_auth. One-Time Password Support. PAM and the other Configuration File. Additional PAM Options. PAM Logs. Available PAM Modules. PAM-Aware Applications. Important Notes about Configuring PAM. The Future of PAM. Summary. For Further Reading. On-Line Documentation. 6. One-Time Passwords. The Purpose of One-Time Passwords. S/Key. S/Key OTP Overview. S/Key Version 1.1b. S/Key Version. OPIE. Obtaining and Installing OPIE. Implementing and Using OPIE. OPIE and PAM. Obtaining and Installing pam_opie. Obtaining and Installing pam_if. Implementing pam_opie and pam_if. Which OTP System Should I Use? Advantages and Disadvantages of S/Key. Advantages and Disadvantages of OPIE. S/Key and OPIE Vulnerabilities. Summary. For Further Reading. Programming. E-Mail Lists. 7. System Accounting. General System Accounting. Connection Accounting. The last Command. The who Command. One Other Command. Process Accounting. The sa Command. The lastcomm Command. Accounting Files. Summary. For Further Reading. Books. On-Line Documentation. 8. System Logging. The syslog System Logging Utility. Overview. The /etc/syslog.conf File. Invoking the syslogd Daemon. Configuring /etc/syslog.conf. The klogd Daemon. Other Logs. Alternatives to syslog. The auditd Utility. Summary. For Further Reading. General System Logging. Intrusion Detection. 9. Superuser Do (sudo). What Is
Synopsis
-- One of the first Linux security books to cover Bastille, a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised.-- New chapter on network sniffers and port scanners used to detect intruders.-- Updated for Redhat 7.2.As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption; Secure filesystems, email, web servers, and other key applications; Protect mixed Linux/Unix and Windows environments. New to this Edition: Updated for Redhat 7.2; One of the first Linux security books to cover Bastille, a hardening program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised; New chapter on network sniffers and port scanners used to detect intruders; Will Cover Open SSH - the new open sour, For courses in LINUX. This tutorial gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrative concepts and tasks are reviewed only at points where such coverage is absolutely necessary.
LC Classification Number
QA76.76.O63M3515

Item description from the seller

Seller business information

I certify that all my selling activities will comply with all EU laws and regulations.
About this seller

MTW Youth

98.9% positive Feedback1.6M items sold

Joined Jul 2004
Registered as a business seller
More Than Words is a non-profit workforce development & youth advocacy program that serves nearly 350 youth each year. We are a youth run business empowering youth to take charge of their lives by ...
See more

Detailed seller ratings

Average for the last 12 months
Accurate description
4.9
Reasonable postage cost
5.0
Delivery time
5.0
Communication
5.0

Seller Feedback (474,066)

All ratings
Positive
Neutral
Negative
  • 0***0 (132)- Feedback left by buyer.
    Past month
    Verified purchase
    Another wonderful transaction with this company! I believe this is my 3rd purchase with multiple books in each order and I’ve yet to be disappointed. Books arrived as described - great used condition. Packaging wasn’t great but it’s free shipping and they made it to me intact, so no complaints. The price is unbeatable. Will definitely continue to purchase from them! Highly recommend.
  • c***u (4299)- Feedback left by buyer.
    Past month
    Verified purchase
    SELLER SHIPS SAFE AND FAST. RECEIVED BOOK DOUBLE WRAPPED SAFE PROTECTED EXACTLY AS DESCRIBED QUICKLY IN PUERTO RICO. THE BEST TERRITORY OF THE UNITED STATES. SELLER IS AN OUTSTANDING WORLD WIDE FIVE STARS EBAYER WITH GREAT CUSTOMER SERVICE E-MAILS COMMUNICATION. BUY WITH CONFIDENCE, SUPPORT EBAYER’S STORE TODAY. GREAT SELLER 100% HIGHLY RECOMMEND ALL THE WAY !
  • r***7 (829)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Fantastic Seller. Fast delivery and Expertly packed to ensure the item is safe. Great Communication when asking a question and always polite and to the point. Item received is exactly what was described. Fair price charged and cost was not over the top. So very, very pleased with this Seller I will rate them No.1 and made the experience of buying on EBay a VERY HAPPY one. Thank you so much.