- STAFF PICKS
- GIFTS + GIFT CARDS
- SELL BOOKS
- FIND A STORE
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
More copies of this ISBN
Practical Unix & Internet Security 3RD Editionby Simson Garfinkel
Synopses & Reviews
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts:
The definitive book on UNIX security, this volume covers every aspect of computer security on UNIX machines and the Internet.
This new edition of Practical UNIX and Internet Security provides detailed coverage of modern security and networking issues. It focuses on the four most popular Unix variants: Solaris, Linux, FreeBSD, and Mac OS X.
About the Author
Simson Garfinkel is a computer security researcher and an award-winning commentator on information technology. Among his twelve books are "Database Nation: The Death of Privacy in the 21st Century" (O Reilly, 2001) and "Practical UNIX and Internet Security, Third Edition" (O Reilly, 2003). A columnist for "CSO" magazine, Garfinkel s columns earned the 2004 and 2005 Jesse H. Neal National Business Journalism Award. He recently received his Ph.D. in computer science from MIT.
Beth Rosenberg is a writer, editor, and journalist with fifteen years of experience in emerging technologies. She has written for the "Boston Globe," "Boston" magazine, and the "Christian Science Monitor," and edited a book for Harvard s Kennedy School of Government.
Spafford is a professor at Purdue University, and Director of CERIAS.
Schwartz is assistant professor of clinical decision making in the Departments of Medical Education and Pediatrics at the University of Illinois at Chicago.
Table of Contents
Preface Computer Security Basics Chapter 1: Introduction: Some Fundamental Questions Chapter 2: Unix History and Lineage Chapter 3: Policies and Guidelines Security Building Blocks Chapter 4: Users, Passwords, and Authentication Chapter 5: Users, Groups, and the Superuser Chapter 6: Filesystems and Security Chapter 7: Cryptography Basics Chapter 8: Physical Security for Servers Chapter 9: Personnel Security Network and Internet Security Chapter 10: Modems and Dialup Security Chapter 11: TCP/IP Networks Chapter 12: Securing TCP and UDP Services Chapter 13: Sun RPC Chapter 14: Network-Based Authentication Systems Chapter 15: Network Filesystems Chapter 16: Secure Programming Techniques Secure Operations Chapter 17: Keeping Up to Date Chapter 18: Backups Chapter 19: Defending Accounts Chapter 20: Integrity Management Chapter 21: Auditing, Logging, and Forensics Handling Security Incidents Chapter 22: Discovering a Break-in Chapter 23: Protecting Against Programmed Threats Chapter 24: Denial of Service Attacks and Solutions Chapter 25: Computer Crime Chapter 26: Who Do You Trust? Appendixes Unix Security Checklist Unix Processes Paper Sources Electronic Resources Organizations Colophon
What Our Readers Are Saying
Other books you might like
Computers and Internet » Internet » General