Practical Unix & Internet Security, 3rd Edition

Practical Unix & Internet Security, 3rd Edition

Alan Schwartz


When Practical Unix Security used to be first released greater than a decade in the past, it turned an immediate vintage. filled with information regarding host defense, it kept many a Unix procedure administrator from catastrophe. the second one version further much-needed web defense assurance and doubled the scale of the unique quantity. The 3rd variation is a accomplished replace of this extremely popular e-book - a spouse for the Unix/Linux method administrator who must safe his or her organization's method, networks, and net presence in an more and more adversarial world.Focusing at the 4 most well-liked Unix editions today--Solaris, Mac OS X, Linux, and FreeBSD--this e-book comprises new info on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft applied sciences, embedded structures, instant and machine matters, forensics, intrusion detection, chroot jails, cellphone scanners and firewalls, digital and cryptographic filesystems, WebNFS, kernel safeguard degrees, outsourcing, felony concerns, new net protocols and cryptographic algorithms, and lots more and plenty more.Practical Unix & net Security comprises six parts:

  • Computer safety fundamentals: advent to defense difficulties and strategies, Unix historical past and lineage, and the significance of defense guidelines as a uncomplicated portion of procedure security.
  • Security development blocks: basics of Unix passwords, clients, teams, the Unix filesystem, cryptography, actual safety, and group of workers security.
  • Network safeguard: an in depth examine modem and dialup safeguard, TCP/IP, securing person community prone, Sun's RPC, numerous host and community authentication platforms (e.g., NIS, NIS+, and Kerberos), NFS and different filesystems, and the significance of safe programming.
  • Secure operations: maintaining up to now in latest altering defense global, backups, protecting opposed to assaults, acting integrity administration, and auditing.
  • Handling safeguard incidents: studying a break-in, facing programmed threats and denial of provider assaults, and felony points of machine security.
  • Appendixes: a finished defense record and an in depth bibliography of paper and digital references for additional analyzing and research.

Packed with one thousand pages of valuable textual content, scripts, checklists, counsel, and warnings, this 3rd version is still the definitive reference for Unix directors and an individual who cares approximately conserving their platforms and information from modern-day threats.

Show sample text content

Download sample