Security

Practical Unix and Internet Security

Author(s): 
Simson Garfinkel
Gene Spafford
Description: 

When Practical UNIX Security was first published in 1991, it became an instant classic. Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.

This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.

If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.

Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.

Contents include:

* Part I: Computer Security Basics. Introduction and security policies.
* Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography.
* Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security.
* Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS.
* Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming.
* Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust.
* VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.

Building Internet Firewalls

Author(s): 
D. Brent Chapman
Elizabeth D. Zwicky
Description: 

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated "Building Internet Firewalls" to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.

Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down.

Like the bestselling and highly respected first edition, "Building Internet Firewalls," 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes:

Firewall technologies: packet filtering, proxying, network address translation, virtual private networks

Architectures such as screening routers, dual-homed hosts, screened hosts, screenedsubnets, perimeter networks, internal firewalls

Issues involved in a variety of new Internet services and protocols through a firewall

Email and News

Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo)

File transfer and sharing services such as NFS, Samba

Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000

Real-time conferencing services such as ICQ and talk

Naming and directory services (e.g., DNS, NetBT, the Windows Browser)

Authentication and auditing services (e.g., PAM, Kerberos, RADIUS);

Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics)

Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP)

Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server)

The book's complete list of resources includes the location of many publicly available firewall construction tools.

Syndicate content