How to Cheat at Securing LinuxBy
- James Stanger, Member of CompTIA's Linux+ Advisory Committee, Chair of Linux Professional Institute Advisory Council, Phoenix, AZ
System administrators and security professionals running Linux Servers who use Snort, Nessus, and Wireshark in conjunction with other security tools to identify and stop potentially malicious traffic crossing networks ranging in size from fewer than 10 machines up to enterprise-class networks with tens of thousands of systems.
Paperback, 432 Pages
Published: October 2007
- Chapter 1: Introduction to Open Source SecurityChapter 2: Hardening the Operating SystemChapter 3: System Scanning and ProbingChapter 4: Implementing an Intrusion Detection SystemChapter 5: Troubleshooting the Network with SniffersChapter 6: Unearthing RootkitsChapter 7: Defending Against MalwareChapter 8: Defending DatabasesChapter 9: Network Authentication and EncryptionChapter 10: Avoiding Sniffing Attacks through EncryptionChapter 11: Creating Virtual Private NetworksChapter 12: Implementing and Maintaining a Firewall