Facebook Twitter Pinterest
  • Alle Preisangaben inkl. MwSt.
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Linux Security Cookbook ist in Ihrem Einkaufwagen hinzugefügt worden
+ EUR 3,00 Versandkosten
Gebraucht: Gut | Details
Verkauft von Bear Books Germany
Zustand: Gebraucht: Gut
Kommentar: Gently used may contain ex-library markings, possibly has some highlighting, textual notations, and or underlining. Text is still readable.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 2 Bilder anzeigen

Linux Security Cookbook (Englisch) Taschenbuch – 13. Juni 2003

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 31,77
EUR 20,64 EUR 3,75
15 neu ab EUR 20,64 7 gebraucht ab EUR 3,75
click to open popover

Wird oft zusammen gekauft

  • Linux Security Cookbook
  • +
  • Linux Server Security
  • +
  • Linux Networking Cookbook
Gesamtpreis: EUR 95,08
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.




"I really enjoyed this book. I think my machine is more secure than before I read this book. The advice is good and pitched at, for me, the right level. References were up-to-date ad far as I could see. I would certainly recommend this book to anyone wanting to secure, or test the esisting security, of a Linux system." - Mick Farmer, Linux Security Cookbook - news@UK, September 2003


Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new "Linux Security Cookbook" does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes-short, focused pieces of code that administrators can use to improve security and perform common tasks securely. The book includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.

The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure. Some of the "recipes" you'll find in this book are: controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more; monitoring your network with tcpdump, dsniff, netstat, and other tools; protecting network connections with Secure Shell (SSH) and stunnel; safeguarding email sessions with Secure Sockets Layer (SSL); encrypting files and email messages with GnuPG; and probing your own security with password crackers, nmap, and handy scripts.

Alle Produktbeschreibungen

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


Es gibt noch keine Kundenrezensionen auf Amazon.de
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: HASH(0x90765e7c) von 5 Sternen 15 Rezensionen
23 von 24 Kunden fanden die folgende Rezension hilfreich
HASH(0x9079c954) von 5 Sternen Good book for quick reference... 29. August 2003
Von foobar - Veröffentlicht auf Amazon.com
Format: Taschenbuch
I read this book from cover to cover and consider it a great effort by the authors to cover many security issues related to not just Linux, but most *nix operating systems. Here's a chapter by chapter review of what I've observed in the book:
Chapter 1 - System Snapshots with Tripwire
I liked the discussion of Tripwire and its configuration options. The sections on "Ultra-Paranoid Integrity Checking" were great! A decent introduction to Tripwire and some of its features.
Chapter 2 - Firewalls with iptables and ipchains
The difference between "Drop versus Reject" targets was good. So many books have info on iptables, but none discusses these issues. Also the point made about dropping ICMP messages was good. Quick to learn and implement recipes presented in this chapter.
Chapter 3 - Restricting Access by Remote Users
Recipe 3.7 was very neat. Allowing users to access a service only by port-forwarding over ssh allows the administrator to restrict access by user names. A smart way of imposing restrictions!
Also, in recipe 3.9, I liked the authors' approach to finding if xinetd is compiled with libwrap support.
All recipes regarding tweaking xinetd were good. It isn't always possible to look at all the configurable options with xinetd, and the authors did a good job in mentioning a few useful options.
Chapter 4 - Authentication Techniques and Infrastructures
Quick tips with PAM, openssl and kerberos. I couldnt get some of the recipes to work on my machine, but got most openssl stuff to work.
Chapter 5 - Authorization Controls
I liked this chapter the best. The discussion on sudo was enlightening, and I was able to effectively tweak most recipes to my needs. The man page would never have provided me with such a good explanation. Thanks to the authors for this chapter.
Chapter 6 - Protecting Outgoing Network Connections
Two of these authors had written the snail book and I expected nothing less than a very useful recipe session on SSH. The most useful recipe here was setting up public key authentication between an openssh client and an ssh.com server and vice-versa. I had always wanted to do this but didnt have a clue until I read these recipes. All recipes have strong technical content and are well written. The recipe on running cron jobs with ssh was
amazing. The authors teach how to be creative, rather than merely
explaining facts and methodologies.
Chapter 7 - Protecting Files
I liked all recipes on GnuPG especially neat hacks like maintaining encrypted files with vim, encrypting backups etc..
Chapter 8 - Protecting Email
I tried out a few recipes and got them to work with my configuration. Pretty impressive stuff! The difference between SSL and STARTTLS daemons was very well explained. I havent seen a consolidated discussion on this topic thus far and was really happy to see things explained clearly in just one sidebar. I couldn't get the imap/ssl recipe working for my settings, inspite of spending quite some time. Perhaps a few screen-shots
made available via the website would've been of greatest help..
Chapter 9 - Testing and Monitoring
Recipes on Cracklib, using find for setuid/setgid files and the discussion on the 'find' command are very well written. Though this stuff has been mentioned in most security books/magazines, a consolidated treatment here is nice to note. nmap truly deserved the long section and I was able to learn a few facts I didnt know about nmap until now. The recipe on examining local network activities covered the best tools in business -
netstat, lsof and rpcinfo. Sniffing network traffic, using tcpdump, ethereal and dsniff provide a good refresher and ready-to-use recipes.
Overall, Linux Security Cookbook is a very useful book for quick
reference. It covers a wide range of security topics and issues related to not just Linux but most Unices. The recipes provided here are well written and ready to use. I have found many tips related to sudo, SSH, xinetd, encryption and network security extremely useful. Full credit to the authors for bringing out such a comprehensive book on Linux Security.
14 von 14 Kunden fanden die folgende Rezension hilfreich
HASH(0x9079c9a8) von 5 Sternen Excellent resource on Linux security 9. Dezember 2003
Von Ben Rothke - Veröffentlicht auf Amazon.com
Format: Taschenbuch
At fewer than 300 pages, the initial size of the Linux Security Cookbook may seem to be meager to cover such a broad subject. But what the book lacks in size, it makes up in content.
While many security books may waste the reader's time by spending hundreds of pages on introductory subjects; chapter 1 of the Linux Security Cookbook goes straight into using and configuring Tripwire.
The book then goes into fundamental topics such as firewalling with iptables/ipchains, authentication, access control, file control, email security and more.
If you are interested in Linux security, this is a well-written and well-organized book, filled with valuable and timely information.
9 von 9 Kunden fanden die folgende Rezension hilfreich
HASH(0x9079cde0) von 5 Sternen Very useful security cookbook 13. Juli 2003
Von Anthony Lawrence - Veröffentlicht auf Amazon.com
Format: Taschenbuch
Enjoyable and useful. I didn't really expect to learn a whole lot from this, but surprisingly (and happily), I did. It's jam packed with practical advice, and avoids the too often seen slant of many security books that don't understand the concept of "good enough". These authors understand that no security is 100%, that you are always trading off convenience, cost, and other variables. Their suggestions and recipes carefully explain the risks and advantages involved with each, and often give alternatives for those with higher or lower security needs.
This would be an excellent book for the new administrator to have right beside the keyboard, but it also will be useful for those with more experience. The recipes are concise, but complete: there is little wasted verbiage, yet you don't feel that anything important was left out.
As I said, I learned a few things. For example, I had never really looked at xinetd, assuming that it was just a slightly polished up inetd with different configuration files. My failure to look below the surface (or even really read the man page) caused me to miss quite a bit, and this book was a wake-up for me on that.
Recommended, worth the money.
8 von 8 Kunden fanden die folgende Rezension hilfreich
HASH(0x9079e1c8) von 5 Sternen Great springboard for Linux security 23. Juli 2003
Von Ein Kunde - Veröffentlicht auf Amazon.com
Format: Taschenbuch
As the title suggests, LSC is a series of different Linux security "recipes." I found the cookbook-style of presentation both good and bad. Some recipes were a breeze to follow (such as the gpg recipes). Other recipes were difficult, but not impossible to follow.
As a "desktop" Linux user who only administers a desktop machine and notebook the chapters I found most useful were those on intrusion detection systems (Chapter 1) and GPG (Chapters 7 & 8). That said, LSC contains dozens of useful recipes for administrators from PAM authentication to monitoring who is doing what on your system. Some of the programs covered are programs I've never heard of before, John the Ripper for example. Other recipes cover those programs I know I should check out, like Snort, but have never taken the time to.
LSC is for the most part very easy to follow. The authors have been very careful to mention when software (snort for example) might or might not be included and how to find and install it. I got tripped up a little in the first chapter (which covers tripwire), because I tried downloading and compiling the tripwire source found at the tripwire web site. I obtained the source from a couple of recommended sites. In one instance tripwire failed to compile correctly, in another it compiled but kept segfaulting when I tried to initialize the database. It wasn't until after I emailed O'Reilly that I saw mention further in Chapter 1 that tripwire is included with Red Hat Linux. One of the authors, Daniel J. Barrett, also emailed me to tell me that it was on the third CD - doh! The upside of this little tale is that I got to know aide (another intrusion detection system) a little better after I installed it on my Debian-based notebook.
... it is certainly money well spent. I now use gpg and check my systems for intrusions on a regular basis. I've also finally found a spring board for learning more about Linux security. Reading O'Reilly's LSC made it easier to follow the ipchains-HOWTO and learn more about Linux security from other sources. If you're new to Linux security LSC is a great springboard for learning about a wide range of Linux security issues.
I've saved what is actually covered in LSC for the end of this review. My intention in this review has been mainly to present my experience with LSC so that other Amazon users who are also still desktop users, or have never really been concerned with Linux security issues can take away the fact that despite a few sticking points I found this book to be a great source for information on different Linux security issues. For those concerned with the meat of the book, here's how it breaks down:
1. System Snapshots with Tripwire
2. Firewalls with iptables and ipchains
3. Network Access Control (xinetd, inetd, preventing DOS attacks)
4. Authentication Techniques and Infrastructures (PAM, SSL, Kerberos)
5. Authorization Controls (su and sudo)
6. Protecting Outgoing Network Connections (OpenSSH)
7. Protecting Files (permissions, GPG)
8. Protecting Email (all popular mail user agents, SSL and SSH)
9. Testing and Monitoring (Jack the Ripper, Cracklib, Snort, tcpdump, syslog)
You really need to have a good look at the table of contents to get an idea of all this book covers. I have written about it from a desktop-user standpoint, but there are so many recipes that I couldn't cover everything. There are many great code snippets that more advanced users would find useful.
If you don't have an intrusion detection system, need to grant some of your users limited root privileges, have been using the default firewall rules (or don't have a clue about iptables/ipchains), haven't checked your system for root kits or insecure protocols, then the Linux Security Cookbook should be at the top of your reading list.
5 von 5 Kunden fanden die folgende Rezension hilfreich
HASH(0x9079cf3c) von 5 Sternen Pensacola LUG review book 15. April 2004
Von Lloyd R. - Veröffentlicht auf Amazon.com
Format: Taschenbuch
The Linux Security Cookbook is a good hands-on guide to the major aspects of securing your Linux box. This book offers many quick reference guides to pieces of software for securing or testing your system and goes through many different means of fortifying your box including:
-controlling system access with firewalls
-monitoring your network
-using SSH and SSL
-intrusion detection systems
-authentication and cryptographic keys
-encrypting files and email messages
-system security probing
The recipes in this book allows administrators to learn quick and easy ways to secure their systems including over 150 ready-to-use scripts and configuration files without having to look up or research specific syntax.
This book is definitely a quick hands-on guide to securing and monitoring your system and would recommend it to anyone looking for a good source of guides and ready-to-use scripts and configurations.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.