Practical Unix And Internet Security Oreilly.pdf
(
7014 KB
)
Pobierz
Practical UNIX & Internet Security Simson Garfinkel & Gene Spafford
Practical UNIX & Internet Security
By Simson Garfinkel & Gene Spafford; ISBN 1-56592-148-8, 1004 pages.
Second Edition, April 1996.
(See the
catalog page
for this book.)
Search
the text of Practical UNIX & Internet Security.
Index
Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Table of Contents
Preface
Part I: Computer Security Basics
Chapter 1: Introduction
Chapter 2: Policies and Guidelines
Part II: User Responsibilities
Chapter 3: Users and Passwords
Chapter 4: Users, Groups, and the Superuser
Chapter 5: The UNIX Filesystem
Chapter 6: Cryptography
Part III: System Security
Chapter 7: Backups
Chapter 8: Defending Your Accounts
Chapter 9: Integrity Management
Chapter 10: Auditing and Logging
Chapter 11: Protecting Against Programmed Threats
Chapter 12: Physical Security
Chapter 13: Personnel Security
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index.htm (1 of 2) [2002-04-12 10:43:38]
Practical UNIX & Internet Security
Part IV: Network and Internet Security
Chapter 14: Telephone Security
Chapter 15: UUCP
Chapter 16: TCP/IP Networks
Chapter 17: TCP/IP Services
Chapter 18: WWW Security
Chapter 19: RPC, NIS, NIS+, and Kerberos
Chapter 20: NFS
Part V: Advanced Topics
Chapter 21: Firewalls
Chapter 22: Wrappers and Proxies
Chapter 23: Writing Secure SUID and Network Programs
Part VI: Handling Security Incidents
Chapter 24: Discovering a Break-in
Chapter 25: Denial of Service Attacks and Solutions
Chapter 26: Computer Security and U.S. Law
Chapter 27: Who Do You Trust?
Part VII: Appendixes
Appendix A: UNIX Security Checklist
Appendix B: Important Files
Appendix C: UNIX Processes
Appendix D: Paper Sources
Appendix E: Electronic Resources
Appendix F: Organizations
Appendix G: Table of IP Services
Copyright
© 1999
O'Reilly & Associates
.
All Rights Reserved.
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index.htm (2 of 2) [2002-04-12 10:43:38]
Index
Search
| Symbols |
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: Symbols and Numbers
10BaseT networks
12.3.1.2. Eavesdropping by Ethernet and 10Base-T
16.1. Networking
8mm video tape :
7.1.4. Guarding Against Media Failure
@ (at sign)
with chacl command :
5.2.5.2. HP-UX access control lists
in xhost list :
17.3.21.3. The xhost facility
! and mail command :
15.1.3. mail Command
. (dot) directory :
5.1.1. Directories
.. (dot-dot) directory :
5.1.1. Directories
# (hash mark), disabling services with :
17.3. Primary UNIX Network Services
+ (plus sign)
in hosts.equiv file :
17.3.18.5. Searching for .rhosts files
in NIS
19.4. Sun's Network Information Service (NIS)
19.4.4.6. NIS is confused about "+"
/ (slash)
IFS separator :
11.5.1.2. IFS attacks
root directory
5.1.1. Directories
(see also
root directory
)
~ (tilde)
in automatic backups :
18.2.3.5. Beware stray CGI scripts
for home directory :
11.5.1.3. $HOME attacks
Search
| Symbols |
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Copyright
© 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index/idx_0.htm (1 of 2) [2002-04-12 10:43:39]
Index
[
Library Home
|
DNS & BIND
|
TCP/IP
|
sendmail
|
sendmail Reference
|
Firewalls
|
Practical Security
]
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index/idx_0.htm (2 of 2) [2002-04-12 10:43:39]
Index
Search
|
Symbols
| A |
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: A
absolute pathnames :
5.1.3. Current Directory and Paths
access
/etc/exports file :
20.2.1.1. /etc/exports
levels, NIS+ :
19.5.4. Using NIS+
by non-citizens :
26.4.1. Munitions Export
tradition of open :
1.4.1. Expectations
via Web :
18.2.2.2. Additional configuration issues
access control :
2.1. Planning Your Security Needs
ACLs
5.2.5. Access Control Lists
5.2.5.2. HP-UX access control lists
17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
anonymous FTP :
17.3.2.1. Using anonymous FTP
Internet servers :
17.2. Controlling Access to Servers
monitoring employee access :
13.2.4. Auditing Access
physical :
12.2.3. Physical Access
restricted filesystems
8.1.5. Restricted Filesystem
8.1.5.2. Checking new software
restricting data availability :
2.1. Planning Your Security Needs
USERFILE (UUCP)
15.4.1. USERFILE: Providing Remote File Access
15.4.2.1. Some bad examples
Web server files
18.3. Controlling Access to Files on Your Server
18.3.3. Setting Up Web Users and Passwords
X Window System
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index/idx_a.htm (1 of 8) [2002-04-12 10:43:40]
Plik z chomika:
ansim11
Inne pliki z tego folderu:
Practical Unix And Internet Security Oreilly.pdf
(7014 KB)
Konfiguracja polaczenia internetowego.pdf
(118 KB)
Linux Shell Scripting Tutorial.pdf
(169 KB)
jakToZrobic_w_GIMP.pdf
(1164 KB)
Linux Troubleshooting Bible.pdf
(13604 KB)
Inne foldery tego chomika:
Galeria
Linux
Programowanie
Prywatne
Rozne
Zgłoś jeśli
naruszono regulamin