Practical UNIX and Internet Security

Securing Solaris, Mac OS X, Linux & Free BSD

DOWNLOAD NOW »

Author: Simson Garfinkel,Gene Spafford,Alan Schwartz

Publisher: "O'Reilly Media, Inc."

ISBN: 1449310125

Category: Computers

Page: 988

View: 3470

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.

Beobachtungsmöglichkeiten im Domain Name System

Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz

DOWNLOAD NOW »

Author: Dominik Herrmann

Publisher: Springer-Verlag

ISBN: 3658132639

Category: Computers

Page: 490

View: 1519

Dominik Herrmann zeigt, dass die Betreiber von Nameservern, die im Internet zur Auflösung von Domainnamen in IP-Adressen verwendet werden, das Verhalten ihrer Nutzer detaillierter nachvollziehen können als bislang gedacht. Insbesondere können sie maschinelle Lernverfahren einsetzen, um einzelne Internetnutzer an ihrem charakteristischen Verhalten wiederzuerkennen und über lange Zeiträume unbemerkt zu überwachen. Etablierte Verfahren eignen sich allerdings nicht zur Anonymisierung der Namensauflösung. Daher schlägt der Autor neue Techniken zum Selbstdatenschutz vor und gibt konkrete Handlungsempfehlungen.

Pro OpenSSH

DOWNLOAD NOW »

Author: Michael Stahnke

Publisher: Apress

ISBN: 1430200766

Category: Computers

Page: 312

View: 1725

* Authored by two Fortune 100 system administrators responsible for the architecture and deployment of OpenSSH across several hundred corporate servers. * Covers commonplace yet often confusing deployment scenarios that come up daily in enterprise environments, large and small. * Focuses upon the worlds most prevalent SSH implementation, OpenSSH.

The Internet Encyclopedia

DOWNLOAD NOW »

Author: Hossein Bidgoli

Publisher: John Wiley & Sons

ISBN: 9780471222033

Category: Business & Economics

Page: 944

View: 6676

The Internet Encyclopedia in a 3-volume reference work on the internet as a business tool, IT platform, and communications and commerce medium.

Web Commerce Security

Design and Development

DOWNLOAD NOW »

Author: Hadi Nahari,Ronald L. Krutz

Publisher: John Wiley & Sons

ISBN: 0470624469

Category: Computers

Page: 474

View: 7962

Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.

Einführung in die bash-Shell

DOWNLOAD NOW »

Author: Cameron Newham,Bill Rosenblatt

Publisher: Springer DE

ISBN: 9783897214248

Category: UNIX (Computer file)

Page: 350

View: 7044

Incident Response & Computer Forensics, 2nd Ed.

DOWNLOAD NOW »

Author: Kevin Mandia,Chris Prosise

Publisher: McGraw Hill Professional

ISBN: 0072230371

Category: Computers

Page: 544

View: 4586

Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks.

Kryptografie verständlich

Ein Lehrbuch für Studierende und Anwender

DOWNLOAD NOW »

Author: Christof Paar,Jan Pelzl

Publisher: Springer-Verlag

ISBN: 3662492970

Category: Computers

Page: 416

View: 7254

Das Buch gibt eine umfassende Einführung in moderne angewandte Kryptografie. Es behandelt nahezu alle kryptografischen Verfahren mit praktischer Relevanz. Es werden symmetrische Verfahren (DES, AES, PRESENT, Stromchiffren), asymmetrische Verfahren (RSA, Diffie-Hellmann, elliptische Kurven) sowie digitale Signaturen, Hash-Funktionen, Message Authentication Codes sowie Schlüsselaustauschprotokolle vorgestellt. Für alle Krypto-Verfahren werden aktuelle Sicherheitseinschätzungen und Implementierungseigenschaften beschrieben.

Designing with Javascript

Creating Dynamic Web Pages

DOWNLOAD NOW »

Author: Nick Heinle,Bill Peña

Publisher: "O'Reilly Media, Inc."

ISBN: 9781565923607

Category: Computers

Page: 216

View: 9148

A guide for beginners offers an overview of JavaScript basics and explains how to create Web pages, identify browsers, and integrate sound, graphics, and animation into Web applications

Linux Kurz and Gut (2nd Edition)

DOWNLOAD NOW »

Author: Daniel J. Barrett

Publisher: O'Reilly Germany

ISBN: 3868994130

Category: Computers

Page: 248

View: 4278

Wenn Sie Linux bei Ihrer alltäglichen Arbeit verwenden, ist diese Kurzreferenz genau das Richtige, denn obwohl die grafischen Linux-Benutzeroberflächen angenehm intuitiv zu benutzen sind, lassen sich viele Aufgaben über die Befehlszeile eleganter und schneller lösen. Diese zweite überarbeitete und erweiterte Auflage behandelt distributionsübergreifend: Dateisysteme, Verzeichnisse und Shells Dateierzeugung und -bearbeitung Dateitextmanipulation und Pipelines Backups und externe Speicherung Betrachtung und Steuerung von Prozessen Verwaltung von Benutzerzugängen Benutzer und Administratoren Netzwerkverbindungen Audio und Video Softwareinstallation Programmierung mit Shellskripten

Moderne Betriebssysteme

DOWNLOAD NOW »

Author: Andrew S. Tanenbaum

Publisher: Pearson Deutschland GmbH

ISBN: 9783827373427

Category: Betriebssystem

Page: 1239

View: 7955

LDAP System Administration

DOWNLOAD NOW »

Author: Gerald Carter

Publisher: O'Reilly Media

ISBN: 9781565924918

Category: Computers

Page: 308

View: 871

Be more productive and make your life easier. That's what LDAP System Administration is all about. System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information. Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux® distributions and Mac OS® X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: Configuration and access control Distributed directories; replication and referral Using OpenLDAP to replace NIS Using OpenLDAP to manage email configurations Using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius Interoperating with different LDAP servers, including Active Directory Programming using Net::LDAP If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.

Linux-Sicherheits-Kochbuch

DOWNLOAD NOW »

Author: Daniel J. Barrett,Richard E. Silverman,Robert G. Byrnes

Publisher: O'Reilly Verlag DE

ISBN: 9783897213647

Category:

Page: 343

View: 5944

UNIX: The Complete Reference, Second Edition

DOWNLOAD NOW »

Author: Kenneth Rosen,Douglas Host,Rachel Klee,Richard Rosinski

Publisher: McGraw Hill Professional

ISBN: 9780071706988

Category: Computers

Page: 912

View: 3610

The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications

High Performance MySQL

DOWNLOAD NOW »

Author: Baron Schwartz,Peter Zaitsev,Vadim Tkachenko,Jeremy D. Zawodny,Arjen Lentz,Derek J. Balling

Publisher: O'Reilly Germany

ISBN: 3897218356

Category: Computers

Page: 768

View: 7288

Einführungen in MySQL gibt es viele. Wer aber größere MySQL-Server betreut, die verlässlich laufen müssen, egal was Programmierer oder Benutzer auf sie loslassen, der braucht weiter reichende Informationen. In High Performance MySQL beschreiben sechs anerkannte Experten mit langjähriger Erfahrung auf großen Systemen alle Stellschrauben, an denen MySQL-Admins drehen können, um Sicherheit, Performance, Datenintegrität und Robustheit zu erhöhen. Von Profis für Profis Hier geht es nicht um kleine Webauftritte mit Datenbankanbindung! Lernen Sie stattdessen fortgeschrittene Techniken kennen, mit denen Sie MySQLs Potenzial voll ausreizen können -- um große, skalierbare Systeme zu entwerfen, zu optimieren und zu sichern. Behandelt werden Benchmarking, Indizes, Storage-Engines, Replikationen, Lastverteilung und Hochverfügbarkeit, Backups, Sicherheit... und zu jedem Aspekt die richtigen Werkzeuge, mit denen sich Ihre Ziele am besten realisieren lassen. Praxiserprobt muss es sein Der eine ist MySQL-Guru bei Yahoo!, der andere Angestellter Nr. 25 bei MySQL AB und dort nacheinander für das MySQL-Manual, die Trainingskurse und die Entwicklung des Supports zuständig, wieder ein anderer war bei MySQL AB im High-Performance-Team – die Autoren dieses Buchs wissen, wovon sie sprechen. Graue Theorie finden Sie woanders, hier geht es um bewährte Techniken aus der Praxis. Die erste Auflage von „High Performance MySQL“ wurde hoch gelobt und hat schon unzähligen Lesern wertvolle Dienste geleistet. Nun war es an der Zeit, dieses anerkannte Handbuch einmal komplett zu aktualisieren, um nützliches Referenzmaterial zu erweitern, neue Features der Versionen MySQL 5.0 und 5.1 zu ergänzen und zahlreiche Themen wie die Optimierung der Storage-Engine InnoDB zu vertiefen.

UNIX: The Complete Reference, Second Edition

DOWNLOAD NOW »

Author: Kenneth Rosen,Douglas Host,Rachel Klee,Richard Rosinski

Publisher: McGraw Hill Professional

ISBN: 0072263369

Category: Computers

Page: 912

View: 4369

The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications

Die Kunst der JavaScript-Programmierung

Eine moderne Einführung in die Sprache des Web

DOWNLOAD NOW »

Author: Marijn Haverbeke

Publisher: dpunkt.verlag

ISBN: 3864911915

Category: Computers

Page: 240

View: 8576

Das Buch ist eine Einführung in JavaScript, die sich auf gute Programmiertechniken konzentriert. Der Autor lehrt den Leser, wie man die Eleganz und Präzision von JavaScript nutzt, um browserbasierte Anwendungen zu schreiben. Das Buch beginnt mit den Grundlagen der Programmierung - Variablen, Kontrollstrukturen, Funktionen und Datenstrukturen -, dann geht es auf komplexere Themen ein, wie die funktionale und objektorientierte Programmierung, reguläre Ausdrücke und Browser-Events. Unterstützt von verständlichen Beispielen wird der Leser rasch die Sprache des Web fließend 'sprechen' können.