Mastering FreeBSD and OpenBSD Security : Building, Securing, and Maintaining BSD Systems
Mastering FreeBSD and OpenBSD Security : Building, Securing, and Maintaining BSD Systems
Click to enlarge
Author(s): Korff, Yanek
Potter, Bruce
ISBN No.: 9780596006266
Pages: 464
Year: 200505
Format: Trade Paper
Price: $ 68.99
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; Comments and Questions; Safari Enabled; Acknowledgments;Security Foundation; Chapter 1: The Big Picture; 1.1 What Is System Security?; 1.2 Identifying Risks; 1.3 Responding to Risk; 1.4 Security Process and Principles; 1.5 System Security Principles; 1.6 Wrapping Up; 1.7 Resources; Chapter 2: BSD Security Building Blocks; 2.


1 Filesystem Protections; 2.2 Tweaking a Running Kernel: sysctl; 2.3 The Basic Sandbox: chroot; 2.4 Jail: Beyond chroot; 2.5 Inherent Protections; 2.6 OS Tuning; 2.7 Wrapping Up; 2.8 Resources; Chapter 3: Secure Installation and Hardening; 3.


1 General Concerns; 3.2 Installing FreeBSD; 3.3 FreeBSD Hardening: Your First Steps; 3.4 Installing OpenBSD; 3.5 OpenBSD Hardening: Your First Steps; 3.6 Post-Upgrade Hardening; 3.7 Wrapping Up; 3.8 Resources; Chapter 4: Secure Administration Techniques; 4.


1 Access Control; 4.2 Security in Everyday Tasks; 4.3 Upgrading; 4.4 Security Vulnerability Response; 4.5 Network Service Security; 4.6 Monitoring System Health; 4.7 Wrapping Up; 4.8 Resources;Deployment Situations; Chapter 5: Creating a Secure DNS Server; 5.


1 The Criticality of DNS; 5.2 DNS Software; 5.3 Installing BIND; 5.4 Installing djbdns; 5.5 Operating BIND; 5.6 Operating djbdns; 5.7 Wrapping Up; 5.8 Resources; Chapter 6: Building Secure Mail Servers; 6.


1 Mail Server Attacks; 6.2 Mail Architecture; 6.3 Mail and DNS; 6.4 SMTP; 6.5 Mail Server Configurations; 6.6 Sendmail; 6.7 Postfix; 6.8 qmail; 6.


9 Mail Access; 6.10 Wrapping Up; 6.11 Resources; Chapter 7: Building a Secure Web Server; 7.1 Web Server Attacks; 7.2 Web Architecture; 7.3 Apache; 7.4 thttpd; 7.5 Advanced Web Servers with Jails; 7.


6 Wrapping Up; 7.7 Resources; Chapter 8: Firewalls; 8.1 Firewall Architectures; 8.2 Host Lockdown; 8.3 The Options: IPFW Versus PF; 8.4 Basic IPFW Configuration; 8.5 Basic PF Configuration; 8.6 Handling Failure; 8.


7 Wrapping Up; 8.8 Resources; Chapter 9: Intrusion Detection; 9.1 No Magic Bullets; 9.2 IDS Architectures; 9.3 NIDS on BSD; 9.4 Snort; 9.5 ACID; 9.6 HIDS on BSD; 9.


7 Wrapping Up; 9.8 Resources;Auditing and Incident Response; Chapter 10: Managing the Audit Trails; 10.1 System Logging; 10.2 Logging via syslogd; 10.3 Securing a Loghost; 10.4 logfile Management; 10.5 Automated Log Monitoring; 10.6 Automated Auditing Scripts; 10.


7 Wrapping Up; 10.8 Resources; Chapter 11: Incident Response and Forensics; 11.1 Incident Response; 11.2 Forensics on BSD; 11.3 Digging Deeper with the Sleuth Kit; 11.4 Wrapping Up; 11.5 Resources;Colophon;.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...