- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
New Trade Paper
Ships in 1 to 3 days
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Linux Server Security 2ND Editionby Michael D Bauer
Synopses & Reviews
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.
This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, Linux Server Security covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell.
Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic.
A number of new security topics have been added for this edition, including:
Now the preferred alternative to the Unix and Microsoft Windows operating systems, Linux is being used increasingly in corporate settings to run servers on complex enterprise networks. In fact, more companies then ever before are using Linux to provide Internet services such as HTTP and Anonymous FTP to the world at large. As a result of Linux's widespread growth, more and more network administrators and developers are counting on its security and reliability. And Linux Server Security, 2nd Edition is the one book they can turn to for all of their Linux server security questions. The book expertly conveys to new users what experienced Linux gurus already know--the tricks of the trade that help them avoid serious security breaches. Thoroughly updated and refreshed, this must-have book lets the good guys stay one step ahead of potential adversaries. Packed with examples and contextual background, Linux Server Security, 2nd Edition helps administrators, developers, and other Linux users understand all the complex issues involved. It also covers both background theory and practical step-by-step instructions for protecting a server that runs Linux. This includes the following important services: firewallingDNSmailApacheremote administration other common servicesThis intelligently revised second edition also features coverage of LDAP, MySQL, POstgreSQL, and Mail Delivery Agents. Written by Linux security expert Michael Bauer, Linux Server Security, 2nd Edition provides users with all the hands-on knowledge they need to create a safer, more secure system.
About the Author
Michael D. (Mick) Bauer, CISSP, is Network Security Architect for a large financial services provider. He is also Security Editor for Linux Journal Magazine, and author of its monthly "Paranoid Penguin" security column. Mick's areas of expertise include Linux security and general Unix security, network (TCP/IP) security, security assessment, and the development of security policies and awareness programs.
Table of Contents
CopyrightDedicationPrefaceChapter 1: Threat Modeling and Risk ManagementChapter 2: Designing Perimeter NetworksChapter 3: Hardening Linux and Using iptablesChapter 4: Secure Remote AdministrationChapter 5: OpenSSL and StunnelChapter 6: Securing Domain Name Services (DNS)Chapter 7: Using LDAP for AuthenticationChapter 8: Database SecurityChapter 9: Securing Internet EmailChapter 10: Securing Web ServersChapter 11: Securing File ServicesChapter 12: System Log Management and MonitoringChapter 13: Simple Intrusion Detection TechniquesAppendix A: Two Complete iptables Startup ScriptsColophon
What Our Readers Are Saying
Other books you might like