Hardening Linux und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr
EUR 27,95
  • Alle Preisangaben inkl. MwSt.
Auf Lager.
Verkauf und Versand durch Amazon.
Geschenkverpackung verfügbar.
Menge:1
Ihren Artikel jetzt
eintauschen und
EUR 0,75 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Alle 2 Bilder anzeigen

Hardening Linux (Englisch) Taschenbuch – 1. Februar 2005


Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
Taschenbuch
"Bitte wiederholen"
EUR 27,95
EUR 27,95 EUR 24,94
6 neu ab EUR 27,95 6 gebraucht ab EUR 24,94

Hinweise und Aktionen

  • Studienbücher: Ob neu oder gebraucht, alle wichtigen Bücher für Ihr Studium finden Sie im großen Studium Special. Natürlich portofrei.


Wird oft zusammen gekauft

Hardening Linux + Hardening Apache (Expert's Voice in Open Source Books for Professionals by Pro)
Preis für beide: EUR 51,90

Die ausgewählten Artikel zusammen kaufen
Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

  • Taschenbuch: 584 Seiten
  • Verlag: Apress; Auflage: 2005 (1. Februar 2005)
  • Sprache: Englisch
  • ISBN-10: 1590594444
  • ISBN-13: 978-1590594445
  • Größe und/oder Gewicht: 19,1 x 3 x 23,5 cm
  • Durchschnittliche Kundenbewertung: 5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: Nr. 73.620 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Synopsis

"Hardening" is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks. The book is written for Linux/UNIX administrators who do not necessarily have in-depth knowledge of security but need to know how to secure their networks. In this book, you'll learn how to secure: The base operating system and firewall with iptables Connections to your hosts Fie systems and files Email servers IMAP and POP servers FTP servers A quick reference of the procedures discussed in each chapter are summarized in Appendix C.

Über den Autor und weitere Mitwirkende

Mark Chandler is UNIX Technical Architect for the KAZ Group Limited in Australia. He is an authority on Wide Area Networks, Local Area Networks, and Storage Area Networks. He has extensive experience with Linux, UNIX, Windows, AS/400, AIX, HP-UX and DEC. James Turnbull is Chief Technology Officer for The George Institute in Australia. He is an expert on IT infrastructure design, Linux, UNIX, Windows, IBM mainframes, network storage, support services design, and business application support.

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


In diesem Buch (Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis
Hier reinlesen und suchen:

Kundenrezensionen

5.0 von 5 Sternen
5 Sterne
1
4 Sterne
0
3 Sterne
0
2 Sterne
0
1 Sterne
0
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel

Die hilfreichsten Kundenrezensionen

1 von 1 Kunden fanden die folgende Rezension hilfreich Von Jan-Piet Mens am 21. August 2006
Format: Taschenbuch
This book fully covers the ground in securing a Linux system. Hardening Linux by James Turnbull (who also authored Pro Nagios 2.0) packs all you need to know about getting a Linux system secured into a single five-hundred page volume.

Turnbull takes the reader in a fast-paced but very comprehensive fashion through the arduous tasks of closing up the open holes in a Red-Hat or Debian – based Linux distribution, and he covers all major topics which include unlikely candidates such as the virtual terminals on the console, immutable files and capabilities, system logging, rootkits, and penetration detection and recovery.

After reading up on the basics which include users & passwords, Pluggable Authentication Modules (PAM), and information on hardening the Linux kernel and the boot loaders, the reader gets an excellent introduction to firewalling with iptables with a whole firewall script for a bastion host in the appendix. That is followed by a full chapter devoted to securing connections with SSL/TLS and remote administration with ssh.

Chapter four is dedicated to securing files and file systems, and includes a section on encrypted file systems to safekeep your data, as well as a walk-through Tripwire. That is followed by a comprehensive look at logging with syslog and syslog-ng, and this chapter includes a discussion and tools related to log analysis and correlation.

NMAP, Nessus and network sniffers make up the bulk of the security testing tools with which Turnbull rightly suggests we check our work after having hardened the basic system. These are covered on fourty pages.

Although Mr.
Lesen Sie weiter... ›
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback. Wenn diese Rezension unangemessen ist, informieren Sie uns bitte darüber.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 10 Rezensionen
32 von 34 Kunden fanden die folgende Rezension hilfreich
Much more than I expected 2. März 2005
Von Anthony Lawrence - Veröffentlicht auf Amazon.com
Format: Taschenbuch
I thought this might just be a book on iptables and other firewalls, but it's much more. In 400 pages, this covers everything from initial installation right through what to do if you did get breached. It covers email security, ftp,

dns and bind, ssh, file systems, pam authentication, firewalls, penetration testing and more.

The really impressive thing is that everything is covered well - obviously some of these subjects could be hundreds of pages by themselves, but the author manages to succintly present the important concepts.

I'd certainly recommend this to anyone running a Linux box.
29 von 31 Kunden fanden die folgende Rezension hilfreich
Excellent. Couldn't ask for more. 13. August 2005
Von Lasse Koskela - Veröffentlicht auf Amazon.com
Format: Taschenbuch
I haven't run a Linux box since 2002. Some time ago, realizing that I'd soon have a chance to migrate to using Linux for everyday work, I decided I should start refreshing my *NIX commands and shell scripting. Then, I saw "Hardening Linux". Rather spontaneously, I decided to start with this security-focused title instead of the perhaps more intuitive path of installing the latest distro, setting up a bunch of daemons, installing databases, etc. That proved to be an excellent decision. "Hardening Linux" is not a small book. Yet, I read the 500 pages more or less cover to cover. Even though we're talking about a book of which purpose is to help you to secure your Linux server, I felt like I learned more about Linux reading this book than I've learned during the last year at work.

Turnbull kick starts the book by explaining user and group management, basics of the Linux file system security, how to verify downloaded packages, which tools and packages you probably should remove from a production server. By page 50, he had also shown how to compile your kernel with security flags and the Openwall project.

After the rather intense first chapter, the rest of the book's chapters each focus on a certain aspect of a system or a specific product, showing how to secure your system from that particular perspective. Most of these chapters are really top-notch compared to most of the online material I've resorted to in the past. For example, Turnbull presents the most intuitive tutorial on configuring the iptables firewall I've seen so far.

Another excellent description is the chapter on file system security. In my experience, the majority of developers dealing with Linux -- myself included -- don't really know much about Linux file system security beyond the basic file permission attributes. Thanks to chapter 4, I know twice as much about what's possible and what to look out for with regards to file permissions and ownership, and all those mysterious "special" characters that don't have to do with the basic read-write-execute stuff.

The author also covers the topics of syslog (and syslog-ng), secure remote connections (including SSL/TLS and SSH among other things), and gives a broad overview of common security analysis tools such as NMAP, Nessus, Ethereal, and tcpdump. Beyond those I already mentioned, Turnbull has written excellent chapters explaining how to secure your email servers (both sendmail and postfix), putting your FTP server into a chroot jail, and how to set up your DNS server and protect yourself from common attacks such as cache poisoning.

All in all, an excellent book on not just Linux security but also on Linux fundamentals. Highly recommended reading if you're running a Linux box you wouldn't want getting "0wn3d."
11 von 12 Kunden fanden die folgende Rezension hilfreich
Great topics 3. Mai 2006
Von Michael Stahnke - Veröffentlicht auf Amazon.com
Format: Taschenbuch
After reading this book, I think it is going to be the mandatory companion I hand out to new Linux administrators, along with Essential System Administration. The first 6 chapters are exceptional. I can't say enough good things about them. The coverage of PAM is better than anything I have seen. The coverage of authentication, groups, users and best practices surrounding them was very good as well. The logging chapter alone is probably worth the purchase of the book.

After the first section, the book covers more specific topics that are of less interest to me. I realize that a lot of people use email, of all kinds. Chapter 7, 8 and 9 cover email, and I just wasn't that excited about it.

Chapter 10 covered securing FTP, which is nice, and 11 covers Bind. I guess I wonder why some of the topics were chosen. There are whole books on email and bind, available, but there isn't always good material for some other services, like CUPS, maybe some web-based administration tools, or SELinux. The coverage of topics that made the table of contents are very good.

I would say if you are new to Linux Security, or a seasoned player looking for just another reference, this book is great.
7 von 9 Kunden fanden die folgende Rezension hilfreich
In-depth explanations with step-by-step techniques for securing Linux and common applications. 11. August 2005
Von R. Lodato - Veröffentlicht auf Amazon.com
Format: Taschenbuch
<em>Hardening Linux</em> by James Turnbull, stands out in my mind as a vitally important text that clearly lays out how to make your Linux boxes as secure as possible. Mr. Turnbull has done a remarkable job in delineating the potential vulnerabilities, and how to mitigate them. Each chapter covers a particular focus area in depth, with carefully worded and easy-to-follow examples. In the cases where you need to install some other piece of software to provide the extra security, he gives you the step-by-step details, leaving nothing for misinterpretation. This is one of those books that, as you finish each chapter, you'll want to apply your new-found knowledge to the machines at your disposal.

As each subsequent chapter unfolds, James explains very carefully how to tighten remote administration, files and file systems, mail, ftp, and DNS/BIND. Additional information is given on how to log important information securely, and efficiently monitor the data collected. In addition, tools for testing the security of your hosts is described very clearly, from the inside-out and the outside-in, along with explanations of how to detect penetrations and recover from them.

Writing about securing a computer system can be written on a few different levels, from the general suggestions which apply to just about any program, to the specific which apply to just one. Mr. Turnbull has chosen to pick commonly used programs and provide step-by-step procedures for locking them down. For example, if you are hardening a mail server, you will find descriptions of Sendmail and Postfix, but not of Qmail or Courier. While this might limit the appeal of the book to just those using the more common programs, it allows a depth that would be otherwise unavailable.

The only quibble I have is that his book does not go far enough. While the chosen types of applications are covered in great depth, some applications are missing. There is no coverage for a web server, such as Apache, or a database server, such as MySQL. I can only hope that a future edition of the book includes chapters on these and other categories of programs.

I definitely recommend <em>Hardening Linux</em> by James Turnbull to anyone who installs and maintains Linux servers. The information packed in this book is easy to follow, and will help you configure your systems very securely. The additional insights into <em>why</em> the configurations are important is extremely valuable in its own right. This book belongs on any Linux sysadmin's bookshelf.
7 von 9 Kunden fanden die folgende Rezension hilfreich
The basics that Linux users must understand 30. April 2005
Von Harold McFarland - Veröffentlicht auf Amazon.com
Format: Taschenbuch
The book starts with the basics of hardening a Linux system to prevent purposeful attack as well as the inadvertently harm some users may cause. This basic section includes booting securely, securing virtual consoles, passwords, groups, users, authentication modules, package management, hardening your kernel, and removing development tools that are not needed.

Of course no book on hardening a system would be complete without discussing how to build an effective firewall. The section on firewalling is excellent and strikes a solid balance between a technical presentation and a user level presentation.

Other important areas include securing connections, secure remote administration, public-key encryption, securing files and file systems, mounting drives securely, securing removable drives, encrypting the file system, and file integrity using tripwire.

Of course setting all of that security up helps a lot but you still need to test the system to see that it works the way you want it to. The author examines several security testing tools to scan your system for root kits and weak passwords as well as using packet sniffers, the Snort intrusion detection system, and other tools.

The book assumes some very basic familiarity with Linux including a file editor, the grep utility, file permissions and ownership, user administration, package management, the purpose and layout of init and init scripts, the basics of networking (TCP/IP, subnetting, etc.), and mounting and unmounting a partition. Hardening Linux is a highly recommended book and provides a better overall view of Linux security than most similar choices.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.