Practical Unix & Internet Security is on its second edition, and its maturity shows. To call this highly readable book comprehensive is an understatement. The breadth is vast, from fundamentals (definitions of computer security; the history of Unix) and commonsense but little-observed security basic
Practical UNIX and Internet Security
โ Scribed by Schwartz, Alan;Garfinkel, Simson;Spafford, Gene
- Publisher
- O'Reilly Media, Inc
- Year
- 2011
- Tongue
- English
- Leaves
- 988
- Edition
- 3rd ed
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix variants.;Table of Contents; Preface; Unix "Security"?; What This Book Is; What This Book Is Not; Third-Party Security Tools; Scope of This Book; Which Unix System?; Versions Covered in This Book; "Secure" Versions of Unix; Conventions Used in This Book; Comments and Questions; Acknowledgments; Third Edition; Second Edition; First Edition; A Note to Would-Be Attackers; Part I; Chapter 1. Introduction: Some Fundamental Questions; What Is Computer Security?; What Is an Operating System?; What Is a Deployment Environment?; Summary; Chapter 2. Unix History and Lineage; History of Unix.
โฆ Table of Contents
Table of Contents
Preface
Unix "Security"?
What This Book Is
What This Book Is Not
Third-Party Security Tools
Scope of This Book
Which Unix System?
Versions Covered in This Book
"Secure" Versions of Unix
Conventions Used in This Book
Comments and Questions
Acknowledgments
Third Edition
Second Edition
First Edition
A Note to Would-Be Attackers
Part I
Chapter 1. Introduction: Some Fundamental Questions
What Is Computer Security?
What Is an Operating System?
What Is a Deployment Environment?
Summary
Chapter 2. Unix History and Lineage
History of Unix. Multics: The Unix PrototypeThe Birth of Unix
Unix escapes AT & T
Unix goes commercial
The Unix Wars: Why Berkeley 4.2 over System V
Unix Wars 2: SVR4 versus OSF/1
Free Unix
FSF and GNU
Minix
Xinu
Linux
NetBSD, FreeBSD, and OpenBSD
Businesses adopt Unix
Second-Generation Commercial Unix Systems
What the Future Holds
Security and Unix
Expectations
Software Quality
Add-on Functionality Breeds Problems
The Failed P1003.1e/2c Unix Security Standard
Role of This Book
Summary
Chapter 3. Policies and Guidelines
Planning Your Security Needs
Types of Security
Trust. Risk AssessmentSteps in Risk Assessment
Identifying assets
Identifying threats
Review Your Risks
Cost-Benefit Analysis and Best Practices
The Cost of Loss
The Probability of a Loss
The Cost of Prevention
Adding Up the Numbers
Best Practices
Convincing Management
Policy
The Role of Policy
Standards
Guidelines
Some Key Ideas in Developing a Workable Policy
Assign an owner
Be positive
Remember that employees are people too
Concentrate on education
Have authority commensurate with responsibility
Be sure you know your security perimeter
Pick a basic philosophy. Defend in depthRisk Management Means Common Sense
Compliance Audits
Outsourcing Options
Formulating Your Plan of Action
Choosing a Vendor
Get a referral and insist on references
Beware of soup-to-nuts
Insist on breadth of background
People
"Reformed" hackers
Monitoring Services
Final Words on Outsourcing
The Problem with Security Through Obscurity
Keeping Secrets
Responsible Disclosure
Summary
Part II
Chapter 4. Users, Passwords, and Authentication
Logging in with Usernames and Passwords
Unix Usernames
Authenticating Users
Authenticating with Passwords. Entering your passwordChanging your password
Verifying your new password
Changing another user's password
The Care and Feeding of Passwords
Bad Passwords: Open Doors
Smoking Joes
Good Passwords: Locked Doors
Password Synchronization: Using the Same Password on Many Machines
Writing Down Passwords
How Unix Implements Passwords
The /etc/passwd File
The Unix Encrypted Password System
The traditional crypt?(??) algorithm
Unix salt
crypt16(??), DES Extended, and Modular Crypt Format
The shadow password and master password files
One-Time Passwords
Public Key Authentication.
โฆ Subjects
Computer science;Computer security;Internet;Operating systems (Computers);UNIX (Computer file);Electronic books;Internet -- Congresses
๐ SIMILAR VOLUMES
This book is just what I was looking for. Excellent Security Guide to day to day security issues at my workplace. Information about TPC and UDP ports and their security risks have been very useful. This book must be part of every UNIX System Security Profesional.
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the or
<div><p>When <i>Practical Unix Security</i> was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the
<div><p>When <i>Practical Unix Security</i> was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protect