To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters.Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today.This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks.Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network.O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer.Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Credits; About the Author; Contributors; Acknowledgments; Preface; Why Network Security Hacks?; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; How to Contact Us; Got a Hack?; Chapter 1: Unix Host Security; 1.1 Hacks #1-20; 1.2 Secure Mount Points; 1.3 Scan for SUID and SGID Programs; 1.4 Scan For World- and Group-Writable Directories; 1.5 Create Flexible Permissions Hierarchies with POSIX ACLs; 1.6 Protect Your Logs from Tampering; 1.7 Delegate Administrative Roles; 1.8 Automate Cryptographic Signature Verification; 1.9 Check for Listening Services; 1.10 Prevent Services from Binding to an Interface; 1.11 Restrict Services with Sandboxed Environments; 1.12 Use proftp with a MySQL Authentication Source; 1.13 Prevent Stack-Smashing Attacks; 1.14 Lock Down Your Kernel with grsecurity; 1.15 Restrict Applications with grsecurity; 1.16 Restrict System Calls with Systrace; 1.17 Automated Systrace Policy Creation; 1.18 Control Login Access with PAM; 1.19 Restricted Shell Environments; 1.20 Enforce User and Group Resource Limits; 1.21 Automate System Updates; Chapter 2: Windows Host Security; 2.1 Hacks #21-30; 2.2 Check Servers for Applied Patches; 2.3 Get a List of Open Files and Their Owning Processes; 2.4 List Running Services and Open Ports; 2.5 Enable Auditing; 2.6 Secure Your Event Logs; 2.7 Change Your Maximum Log File Sizes; 2.8 Disable Default Shares; 2.9 Encrypt Your Temp Folder; 2.10 Clear the Paging File at Shutdown; 2.11 Restrict Applications Available to Users; Chapter 3: Network Security; 3.1 Hacks #31-53; 3.2 Detect ARP Spoofing; 3.3 Create a Static ARP Table; 3.4 Firewall with Netfilter; 3.5 Firewall with OpenBSD’s PacketFilter; 3.6 Create an Authenticated Gateway; 3.7 Firewall with Windows; 3.8 Keep Your Network Self-Contained; 3.9 Test Your Firewall; 3.10 MAC Filtering with Netfilter; 3.11 Block OS Fingerprinting; 3.12 Fool Remote Operating System Detection Software; 3.13 Keep an Inventory of Your Network; 3.14 Scan Your Network for Vulnerabilities; 3.15 Keep Server Clocks Synchronized; 3.16 Create Your Own Certificate Authority; 3.17 Distribute Your CA to Clients; 3.18 Encrypt IMAP and POP with SSL; 3.19 Set Up TLS-Enabled SMTP; 3.20 Detect Ethernet Sniffers Remotely; 3.21 Install Apache with SSL and suEXEC; 3.22 Secure BIND; 3.23 Secure MySQL; 3.24 Share Files Securely in Unix; Chapter 4: Logging; 4.1 Hacks #54-60; 4.2 Run a Central Syslog Server; 4.3 Steer Syslog; 4.4 Integrate Windows into Your Syslog Infrastructure; 4.5 Automatically Summarize Your Logs; 4.6 Monitor Your Logs Automatically; 4.7 Aggregate Logs from Remote Sites; 4.8 Log User Activity with Process Accounting; Chapter 5: Monitoring and Trending; 5.1 Hacks #61-66; 5.2 Monitor Availability; 5.3 Graph Trends; 5.4 Run ntop for Real-Time Network Stats; 5.5 Audit Network Traffic; 5.6 Collect Statistics with Firewall Rules; 5.7 Sniff the Ether Remotely; Chapter 6: Secure Tunnels; 6.1 Hacks #67-81; 6.2 Set Up IPsec Under Linux; 6.3 Set Up IPsec Under FreeBSD; 6.4 Set Up IPsec in OpenBSD; 6.5 PPTP Tunneling; 6.6 Opportunistic Encryption with FreeS/WAN; 6.7 Forward and Encrypt Traffic with SSH; 6.8 Quick Logins with SSH Client Keys; 6.9 Squid Proxy over SSH; 6.10 Use SSH as a SOCKS Proxy; 6.11 Encrypt and Tunnel Traffic with SSL; 6.12 Tunnel Connections Inside HTTP; 6.13 Tunnel with VTun and SSH; 6.14 Automatic vtund.conf Generator; 6.15 Create a Cross-Platform VPN; 6.16 Tunnel PPP; Chapter 7: Network Intrusion Detection; 7.1 Hacks #82-95; 7.2 Detect Intrusions with Snort; 7.3 Keep Track of Alerts; 7.4 Real-Time Monitoring; 7.5 Manage a Sensor Network; 7.6 Write Your Own Snort Rules; 7.7 Prevent and Contain Intrusions with Snort_inline; 7.8 Automated Dynamic Firewalling with SnortSam; 7.9 Detect Anomalous Behavior; 7.10 Automatically Update Snort’s Rules; 7.11 Create a Distributed Stealth Sensor Network; 7.12 Use Snort in High-Performance Environments with Barnyard; 7.13 Detect and Prevent Web Application Intrusions; 7.14 Simulate a Network of Vulnerable Hosts; 7.15 Record Honeypot Activity; Chapter 8: Recovery and Response; 8.1 Hacks #96-100; 8.2 Image Mounted Filesystems; 8.3 Verify File Integrity and Find Compromised Files; 8.4 Find Compromised Packages with RPM; 8.5 Scan for Root Kits; 8.6 Find the Owner of a Network; Colophon;
Book by Lockhart Andrew
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
GRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiGRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiDa: Wonder Book, Frederick, MD, U.S.A.
Condizione: Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Codice articolo X02B-01785
Quantità: 1 disponibili
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Good. Used book that is in clean, average condition without any missing pages. Codice articolo GRP11305610
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Used book that is in clean, average condition without any missing pages. Codice articolo GRP11305610
Quantità: 1 disponibili
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo GRP105475958
Quantità: 1 disponibili
Da: SecondSale, Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00040132600
Quantità: 4 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1. Codice articolo G0596006438I4N00
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
paperback. Condizione: Acceptable. Connecting readers with great books since 1972. Used textbooks may not include companion materials such as access codes, etc. May have condition issues including wear and notes/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_377712497
Quantità: 1 disponibili
Da: Your Online Bookstore, Houston, TX, U.S.A.
paperback. Condizione: New. Codice articolo 0596006438-11-33242292
Quantità: 1 disponibili
Da: HPB-Emerald, Dallas, TX, U.S.A.
paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! Codice articolo S_435323092
Quantità: 1 disponibili
Da: Phatpocket Limited, Waltham Abbey, HERTS, Regno Unito
Condizione: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. Codice articolo Z1-S-037-03928
Quantità: 1 disponibili