๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Practical UNIX and Internet Security

โœ Scribed by Schwartz, Alan;Garfinkel, Simson;Spafford, Gene


Publisher
O'Reilly Media, Inc
Year
2011
Tongue
English
Leaves
988
Edition
3rd ed
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix variants.;Table of Contents; Preface; Unix "Security"?; What This Book Is; What This Book Is Not; Third-Party Security Tools; Scope of This Book; Which Unix System?; Versions Covered in This Book; "Secure" Versions of Unix; Conventions Used in This Book; Comments and Questions; Acknowledgments; Third Edition; Second Edition; First Edition; A Note to Would-Be Attackers; Part I; Chapter 1. Introduction: Some Fundamental Questions; What Is Computer Security?; What Is an Operating System?; What Is a Deployment Environment?; Summary; Chapter 2. Unix History and Lineage; History of Unix.

โœฆ Table of Contents


Table of Contents
Preface
Unix "Security"?
What This Book Is
What This Book Is Not
Third-Party Security Tools
Scope of This Book
Which Unix System?
Versions Covered in This Book
"Secure" Versions of Unix
Conventions Used in This Book
Comments and Questions
Acknowledgments
Third Edition
Second Edition
First Edition
A Note to Would-Be Attackers
Part I
Chapter 1. Introduction: Some Fundamental Questions
What Is Computer Security?
What Is an Operating System?
What Is a Deployment Environment?
Summary
Chapter 2. Unix History and Lineage
History of Unix. Multics: The Unix PrototypeThe Birth of Unix
Unix escapes AT & T
Unix goes commercial
The Unix Wars: Why Berkeley 4.2 over System V
Unix Wars 2: SVR4 versus OSF/1
Free Unix
FSF and GNU
Minix
Xinu
Linux
NetBSD, FreeBSD, and OpenBSD
Businesses adopt Unix
Second-Generation Commercial Unix Systems
What the Future Holds
Security and Unix
Expectations
Software Quality
Add-on Functionality Breeds Problems
The Failed P1003.1e/2c Unix Security Standard
Role of This Book
Summary
Chapter 3. Policies and Guidelines
Planning Your Security Needs
Types of Security
Trust. Risk AssessmentSteps in Risk Assessment
Identifying assets
Identifying threats
Review Your Risks
Cost-Benefit Analysis and Best Practices
The Cost of Loss
The Probability of a Loss
The Cost of Prevention
Adding Up the Numbers
Best Practices
Convincing Management
Policy
The Role of Policy
Standards
Guidelines
Some Key Ideas in Developing a Workable Policy
Assign an owner
Be positive
Remember that employees are people too
Concentrate on education
Have authority commensurate with responsibility
Be sure you know your security perimeter
Pick a basic philosophy. Defend in depthRisk Management Means Common Sense
Compliance Audits
Outsourcing Options
Formulating Your Plan of Action
Choosing a Vendor
Get a referral and insist on references
Beware of soup-to-nuts
Insist on breadth of background
People
"Reformed" hackers
Monitoring Services
Final Words on Outsourcing
The Problem with Security Through Obscurity
Keeping Secrets
Responsible Disclosure
Summary
Part II
Chapter 4. Users, Passwords, and Authentication
Logging in with Usernames and Passwords
Unix Usernames
Authenticating Users
Authenticating with Passwords. Entering your passwordChanging your password
Verifying your new password
Changing another user's password
The Care and Feeding of Passwords
Bad Passwords: Open Doors
Smoking Joes
Good Passwords: Locked Doors
Password Synchronization: Using the Same Password on Many Machines
Writing Down Passwords
How Unix Implements Passwords
The /etc/passwd File
The Unix Encrypted Password System
The traditional crypt?(??) algorithm
Unix salt
crypt16(??), DES Extended, and Modular Crypt Format
The shadow password and master password files
One-Time Passwords
Public Key Authentication.

โœฆ Subjects


Computer science;Computer security;Internet;Operating systems (Computers);UNIX (Computer file);Electronic books;Internet -- Congresses


๐Ÿ“œ SIMILAR VOLUMES


Practical Unix and Internet Security
โœ Simson Garfinkel, Gene Spafford ๐Ÿ“‚ Library ๐Ÿ“… 1996 ๐Ÿ› Model Hobby ๐ŸŒ English

Practical Unix & Internet Security is on its second edition, and its maturity shows. To call this highly readable book comprehensive is an understatement. The breadth is vast, from fundamentals (definitions of computer security; the history of Unix) and commonsense but little-observed security basic

Practical Unix and Internet Security, 2n
โœ Simson Garfinkel, Gene Spafford PH.D. ๐Ÿ“‚ Library ๐Ÿ“… 1996 ๐Ÿ› O'Reilly Media ๐ŸŒ English

This book is just what I was looking for. Excellent Security Guide to day to day security issues at my workplace. Information about TPC and UDP ports and their security risks have been very useful. This book must be part of every UNIX System Security Profesional.

Practical Unix & Internet Security, 3rd
โœ Simson Garfinkel, Gene Spafford PH.D., Alan Schwartz PH.D. ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› O'Reilly Media ๐ŸŒ English

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the or

Practical Unix & Internet Security, 3rd
โœ Simson Garfinkel, Gene Spafford, Alan Schwartz ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<div><p>When <i>Practical Unix Security</i> was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the

Practical Unix & Internet Security, 3rd
โœ Simson Garfinkel, Gene Spafford, Alan Schwartz ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› O'Reilly Media ๐ŸŒ English

<div><p>When <i>Practical Unix Security</i> was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the

Practical Internet Security
โœ John R. Vacca ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐ŸŒ English

As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protect