49,10 €*
Versandkostenfrei per Post / DHL
Lieferzeit 2-3 Wochen
Yanek Korff graduated with a Bachelor's degree in Computer Science from the College of William and Mary and is currently a Certified Information Systems Security Professional (CISSP). Mr. Korff joined Bell Atlantic as a Systems Engineer where he played a major role in the strategy, design, and deployment of a key Northern Virginia test facility. He later joined Cigital, Inc., a software quality management company, where he played a central role in the design of their systems infrastructure. He is now an essential member of the Information Security division at America Online. During his career, Mr. Korff has been able to identify and mitigate information security risks particularly relating to host-based BSD security. By leveraging his experience, he has been able to apply security fundamentals to influence business and industry practices.
Paco Hope is a Technical Manager with Cigital. His areas of expertise software security, security testing, and casino gaming. He specializes in analyzing the security of software, software systems, and software development processes. Paco frequently speaks at conferences such as the Better Software Conference, STAR East, and STAR West. He conducts training on risk-based security testing, writing security requirements, and software security fundamentals. He can be reached at [...]
Bruce Potter is a Senior Associate at Booz Allen Hamilton. Prior to working at Booz Allen Hamilton, Bruce served as a software security consultant for Cigital in Dulles, VA. Bruce is the founder of the Shmoo Group of security professionals. His areas of expertise include wireless security, large-scale network architectures, smartcards, and promotion of secure software engineering practices. Bruce coauthored the books 802.11 Security and Mac OS X Security. He was trained in computer science at the University of Alaska, Fairbanks.
Audience;
Assumptions This Book Makes;
Contents of This Book;
Conventions Used in This Book;
Using Code Examples;
Comments and Questions;
Safari Enabled;
Acknowledgments;
Security Foundation;
Chapter 1: The Big Picture;
1.1 What Is System Security?;
1.2 Identifying Risks;
1.3 Responding to Risk;
1.4 Security Process and Principles;
1.5 System Security Principles;
1.6 Wrapping Up;
1.7 Resources;
Chapter 2: BSD Security Building Blocks;
2.1 Filesystem Protections;
2.2 Tweaking a Running Kernel: sysctl;
2.3 The Basic Sandbox: chroot;
2.4 Jail: Beyond chroot;
2.5 Inherent Protections;
2.6 OS Tuning;
2.7 Wrapping Up;
2.8 Resources;
Chapter 3: Secure Installation and Hardening;
3.1 General Concerns;
3.2 Installing FreeBSD;
3.3 FreeBSD Hardening: Your First Steps;
3.4 Installing OpenBSD;
3.5 OpenBSD Hardening: Your First Steps;
3.6 Post-Upgrade Hardening;
3.7 Wrapping Up;
3.8 Resources;
Chapter 4: Secure Administration Techniques;
4.1 Access Control;
4.2 Security in Everyday Tasks;
4.3 Upgrading;
4.4 Security Vulnerability Response;
4.5 Network Service Security;
4.6 Monitoring System Health;
4.7 Wrapping Up;
4.8 Resources;
Deployment Situations;
Chapter 5: Creating a Secure DNS Server;
5.1 The Criticality of DNS;
5.2 DNS Software;
5.3 Installing BIND;
5.4 Installing djbdns;
5.5 Operating BIND;
5.6 Operating djbdns;
5.7 Wrapping Up;
5.8 Resources;
Chapter 6: Building Secure Mail Servers;
6.1 Mail Server Attacks;
6.2 Mail Architecture;
6.3 Mail and DNS;
6.4 SMTP;
6.5 Mail Server Configurations;
6.6 Sendmail;
6.7 Postfix;
6.8 qmail;
6.9 Mail Access;
6.10 Wrapping Up;
6.11 Resources;
Chapter 7: Building a Secure Web Server;
7.1 Web Server Attacks;
7.2 Web Architecture;
7.3 Apache;
7.4 thttpd;
7.5 Advanced Web Servers with Jails;
7.6 Wrapping Up;
7.7 Resources;
Chapter 8: Firewalls;
8.1 Firewall Architectures;
8.2 Host Lockdown;
8.3 The Options: IPFW Versus PF;
8.4 Basic IPFW Configuration;
8.5 Basic PF Configuration;
8.6 Handling Failure;
8.7 Wrapping Up;
8.8 Resources;
Chapter 9: Intrusion Detection;
9.1 No Magic Bullets;
9.2 IDS Architectures;
9.3 NIDS on BSD;
9.4 Snort;
9.5 ACID;
9.6 HIDS on BSD;
9.7 Wrapping Up;
9.8 Resources;
Auditing and Incident Response;
Chapter 10: Managing the Audit Trails;
10.1 System Logging;
10.2 Logging via syslogd;
10.3 Securing a Loghost;
10.4 logfile Management;
10.5 Automated Log Monitoring;
10.6 Automated Auditing Scripts;
10.7 Wrapping Up;
10.8 Resources;
Chapter 11: Incident Response and Forensics;
11.1 Incident Response;
11.2 Forensics on BSD;
11.3 Digging Deeper with the Sleuth Kit;
11.4 Wrapping Up;
11.5 Resources;
Colophon;
Erscheinungsjahr: | 2005 |
---|---|
Fachbereich: | Betriebssysteme & Benutzeroberflächen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | 445 S. |
ISBN-13: | 9780596006266 |
ISBN-10: | 0596006268 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Korff, Yanek
Hope, Paco Potter, Bruce |
Hersteller: |
O'Reilly Media
O'Reilly and Associates |
Verantwortliche Person für die EU: | dpunkt.verlag GmbH, Vanessa Niethammer, Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
Maße: | 234 x 179 x 35 mm |
Von/Mit: | Yanek Korff (u. a.) |
Erscheinungsdatum: | 03.05.2005 |
Gewicht: | 0,736 kg |
Yanek Korff graduated with a Bachelor's degree in Computer Science from the College of William and Mary and is currently a Certified Information Systems Security Professional (CISSP). Mr. Korff joined Bell Atlantic as a Systems Engineer where he played a major role in the strategy, design, and deployment of a key Northern Virginia test facility. He later joined Cigital, Inc., a software quality management company, where he played a central role in the design of their systems infrastructure. He is now an essential member of the Information Security division at America Online. During his career, Mr. Korff has been able to identify and mitigate information security risks particularly relating to host-based BSD security. By leveraging his experience, he has been able to apply security fundamentals to influence business and industry practices.
Paco Hope is a Technical Manager with Cigital. His areas of expertise software security, security testing, and casino gaming. He specializes in analyzing the security of software, software systems, and software development processes. Paco frequently speaks at conferences such as the Better Software Conference, STAR East, and STAR West. He conducts training on risk-based security testing, writing security requirements, and software security fundamentals. He can be reached at [...]
Bruce Potter is a Senior Associate at Booz Allen Hamilton. Prior to working at Booz Allen Hamilton, Bruce served as a software security consultant for Cigital in Dulles, VA. Bruce is the founder of the Shmoo Group of security professionals. His areas of expertise include wireless security, large-scale network architectures, smartcards, and promotion of secure software engineering practices. Bruce coauthored the books 802.11 Security and Mac OS X Security. He was trained in computer science at the University of Alaska, Fairbanks.
Audience;
Assumptions This Book Makes;
Contents of This Book;
Conventions Used in This Book;
Using Code Examples;
Comments and Questions;
Safari Enabled;
Acknowledgments;
Security Foundation;
Chapter 1: The Big Picture;
1.1 What Is System Security?;
1.2 Identifying Risks;
1.3 Responding to Risk;
1.4 Security Process and Principles;
1.5 System Security Principles;
1.6 Wrapping Up;
1.7 Resources;
Chapter 2: BSD Security Building Blocks;
2.1 Filesystem Protections;
2.2 Tweaking a Running Kernel: sysctl;
2.3 The Basic Sandbox: chroot;
2.4 Jail: Beyond chroot;
2.5 Inherent Protections;
2.6 OS Tuning;
2.7 Wrapping Up;
2.8 Resources;
Chapter 3: Secure Installation and Hardening;
3.1 General Concerns;
3.2 Installing FreeBSD;
3.3 FreeBSD Hardening: Your First Steps;
3.4 Installing OpenBSD;
3.5 OpenBSD Hardening: Your First Steps;
3.6 Post-Upgrade Hardening;
3.7 Wrapping Up;
3.8 Resources;
Chapter 4: Secure Administration Techniques;
4.1 Access Control;
4.2 Security in Everyday Tasks;
4.3 Upgrading;
4.4 Security Vulnerability Response;
4.5 Network Service Security;
4.6 Monitoring System Health;
4.7 Wrapping Up;
4.8 Resources;
Deployment Situations;
Chapter 5: Creating a Secure DNS Server;
5.1 The Criticality of DNS;
5.2 DNS Software;
5.3 Installing BIND;
5.4 Installing djbdns;
5.5 Operating BIND;
5.6 Operating djbdns;
5.7 Wrapping Up;
5.8 Resources;
Chapter 6: Building Secure Mail Servers;
6.1 Mail Server Attacks;
6.2 Mail Architecture;
6.3 Mail and DNS;
6.4 SMTP;
6.5 Mail Server Configurations;
6.6 Sendmail;
6.7 Postfix;
6.8 qmail;
6.9 Mail Access;
6.10 Wrapping Up;
6.11 Resources;
Chapter 7: Building a Secure Web Server;
7.1 Web Server Attacks;
7.2 Web Architecture;
7.3 Apache;
7.4 thttpd;
7.5 Advanced Web Servers with Jails;
7.6 Wrapping Up;
7.7 Resources;
Chapter 8: Firewalls;
8.1 Firewall Architectures;
8.2 Host Lockdown;
8.3 The Options: IPFW Versus PF;
8.4 Basic IPFW Configuration;
8.5 Basic PF Configuration;
8.6 Handling Failure;
8.7 Wrapping Up;
8.8 Resources;
Chapter 9: Intrusion Detection;
9.1 No Magic Bullets;
9.2 IDS Architectures;
9.3 NIDS on BSD;
9.4 Snort;
9.5 ACID;
9.6 HIDS on BSD;
9.7 Wrapping Up;
9.8 Resources;
Auditing and Incident Response;
Chapter 10: Managing the Audit Trails;
10.1 System Logging;
10.2 Logging via syslogd;
10.3 Securing a Loghost;
10.4 logfile Management;
10.5 Automated Log Monitoring;
10.6 Automated Auditing Scripts;
10.7 Wrapping Up;
10.8 Resources;
Chapter 11: Incident Response and Forensics;
11.1 Incident Response;
11.2 Forensics on BSD;
11.3 Digging Deeper with the Sleuth Kit;
11.4 Wrapping Up;
11.5 Resources;
Colophon;
Erscheinungsjahr: | 2005 |
---|---|
Fachbereich: | Betriebssysteme & Benutzeroberflächen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | 445 S. |
ISBN-13: | 9780596006266 |
ISBN-10: | 0596006268 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: |
Korff, Yanek
Hope, Paco Potter, Bruce |
Hersteller: |
O'Reilly Media
O'Reilly and Associates |
Verantwortliche Person für die EU: | dpunkt.verlag GmbH, Vanessa Niethammer, Wieblinger Weg 17, D-69123 Heidelberg, hallo@dpunkt.de |
Maße: | 234 x 179 x 35 mm |
Von/Mit: | Yanek Korff (u. a.) |
Erscheinungsdatum: | 03.05.2005 |
Gewicht: | 0,736 kg |