Practical Unix And Internet Security Oreilly.pdf
(
7014 KB
)
Pobierz
Practical UNIX & Internet Security Simson Garfinkel & Gene Spafford
Practical UNIX & Internet Security
By Simson Garfinkel & Gene Spafford; ISBN 1-56592-148-8, 1004 pages.
Second Edition, April 1996.
(See the
catalog page
for this book.)
Search
the text of Practical UNIX & Internet Security.
Index
Symbols
|
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Table of Contents
Preface
Part I: Computer Security Basics
Chapter 1: Introduction
Chapter 2: Policies and Guidelines
Part II: User Responsibilities
Chapter 3: Users and Passwords
Chapter 4: Users, Groups, and the Superuser
Chapter 5: The UNIX Filesystem
Chapter 6: Cryptography
Part III: System Security
Chapter 7: Backups
Chapter 8: Defending Your Accounts
Chapter 9: Integrity Management
Chapter 10: Auditing and Logging
Chapter 11: Protecting Against Programmed Threats
Chapter 12: Physical Security
Chapter 13: Personnel Security
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index.htm (1 of 2) [2002-04-12 10:43:38]
Practical UNIX & Internet Security
Part IV: Network and Internet Security
Chapter 14: Telephone Security
Chapter 15: UUCP
Chapter 16: TCP/IP Networks
Chapter 17: TCP/IP Services
Chapter 18: WWW Security
Chapter 19: RPC, NIS, NIS+, and Kerberos
Chapter 20: NFS
Part V: Advanced Topics
Chapter 21: Firewalls
Chapter 22: Wrappers and Proxies
Chapter 23: Writing Secure SUID and Network Programs
Part VI: Handling Security Incidents
Chapter 24: Discovering a Break-in
Chapter 25: Denial of Service Attacks and Solutions
Chapter 26: Computer Security and U.S. Law
Chapter 27: Who Do You Trust?
Part VII: Appendixes
Appendix A: UNIX Security Checklist
Appendix B: Important Files
Appendix C: UNIX Processes
Appendix D: Paper Sources
Appendix E: Electronic Resources
Appendix F: Organizations
Appendix G: Table of IP Services
Copyright
© 1999
O'Reilly & Associates
.
All Rights Reserved.
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index.htm (2 of 2) [2002-04-12 10:43:38]
Index
Search
| Symbols |
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: Symbols and Numbers
10BaseT networks
12.3.1.2. Eavesdropping by Ethernet and 10Base-T
16.1. Networking
8mm video tape :
7.1.4. Guarding Against Media Failure
@ (at sign)
with chacl command :
5.2.5.2. HP-UX access control lists
in xhost list :
17.3.21.3. The xhost facility
! and mail command :
15.1.3. mail Command
. (dot) directory :
5.1.1. Directories
.. (dot-dot) directory :
5.1.1. Directories
# (hash mark), disabling services with :
17.3. Primary UNIX Network Services
+ (plus sign)
in hosts.equiv file :
17.3.18.5. Searching for .rhosts files
in NIS
19.4. Sun's Network Information Service (NIS)
19.4.4.6. NIS is confused about "+"
/ (slash)
IFS separator :
11.5.1.2. IFS attacks
root directory
5.1.1. Directories
(see also
root directory
)
~ (tilde)
in automatic backups :
18.2.3.5. Beware stray CGI scripts
for home directory :
11.5.1.3. $HOME attacks
Search
| Symbols |
A
|
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Copyright
© 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index/idx_0.htm (1 of 2) [2002-04-12 10:43:39]
Index
[
Library Home
|
DNS & BIND
|
TCP/IP
|
sendmail
|
sendmail Reference
|
Firewalls
|
Practical Security
]
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index/idx_0.htm (2 of 2) [2002-04-12 10:43:39]
Index
Search
|
Symbols
| A |
B
|
C
|
D
|
E
|
F
|
G
|
H
|
I
|
J
|
K
|
L
|
M
|
N
|
O
|
P
|
Q
|
R
|
S
|
T
|
U
|
V
|
W
|
X
|
Y
|
Z
Index: A
absolute pathnames :
5.1.3. Current Directory and Paths
access
/etc/exports file :
20.2.1.1. /etc/exports
levels, NIS+ :
19.5.4. Using NIS+
by non-citizens :
26.4.1. Munitions Export
tradition of open :
1.4.1. Expectations
via Web :
18.2.2.2. Additional configuration issues
access control :
2.1. Planning Your Security Needs
ACLs
5.2.5. Access Control Lists
5.2.5.2. HP-UX access control lists
17.3.13. Network News Transport Protocol (NNTP) (TCP Port 119)
anonymous FTP :
17.3.2.1. Using anonymous FTP
Internet servers :
17.2. Controlling Access to Servers
monitoring employee access :
13.2.4. Auditing Access
physical :
12.2.3. Physical Access
restricted filesystems
8.1.5. Restricted Filesystem
8.1.5.2. Checking new software
restricting data availability :
2.1. Planning Your Security Needs
USERFILE (UUCP)
15.4.1. USERFILE: Providing Remote File Access
15.4.2.1. Some bad examples
Web server files
18.3. Controlling Access to Files on Your Server
18.3.3. Setting Up Web Users and Passwords
X Window System
file:///C|/Oreilly Unix etc/O'Reilly Reference Library/networking/puis/index/idx_a.htm (1 of 8) [2002-04-12 10:43:40]
Plik z chomika:
ansim11
Inne pliki z tego folderu:
Wiley.SUSE.Linux.10.Bible.Feb.2006.pdf
(23029 KB)
Wiley, Suse Linux 10 For Dummies (2005) Ddu.pdf
(13349 KB)
Practical Unix And Internet Security Oreilly.pdf
(7014 KB)
Linux Troubleshooting Bible.pdf
(13604 KB)
Linux Shell Scripting Tutorial.pdf
(169 KB)
Inne foldery tego chomika:
Dokumenty
Galeria
Programowanie
Prywatne
Rozne
Zgłoś jeśli
naruszono regulamin