skip to content
Network security hacks Preview this item
ClosePreview this item
Checking...

Network security hacks

Author: Andrew Lockhart
Publisher: Sebastopol, CA : O'Reilly, ©2004.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:

Providing more than 100 quick, practical and clever things to do to help make your Linux, UNIX, or Windows networks more secure. Loaded with concise but powerful examples, it demonstrates effective  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Print version:
Lockhart, Andrew.
Network security hacks.
Sebastopol, CA : O'Reilly, ©2004
(OCoLC)55204267
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Andrew Lockhart
OCLC Number: 55506290
Notes: Includes index.
Reproduction Notes: Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL
Description: 1 online resource (xv, 298) : illustrations
Details: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
Contents: Credits Preface Chapter 1. Unix Host Security 1. Secure Mount Points 2. Scan for SUID and SGID Programs 3. Scan For World- and Group-Writable Directories 4. Create Flexible Permissions Hierarchies with POSIX ACLs 5. Protect Your Logs from Tampering 6. Delegate Administrative Roles 7. Automate Cryptographic Signature Verification 8. Check for Listening Services 9. Prevent Services from Binding to an Interface 10. Restrict Services with Sandboxed Environments 11. Use proftp with a MySQL Authentication Source 12. Prevent Stack-Smashing Attacks 13. Lock Down Your Kernel with grsecurity 14. Restrict Applications with grsecurity 15. Restrict System Calls with Systrace 16. Automated Systrace Policy Creation 17. Control Login Access with PAM 18. Restricted Shell Environments 19. Enforce User and Group Resource Limits 20. Automate System Updates Chapter 2. Windows Host Security 21. Check Servers for Applied Patches 22. Get a List of Open Files and Their Owning Processes 23. List Running Services and Open Ports 24. Enable Auditing 25. Secure Your Event Logs 26. Change Your Maximum Log File Sizes 27. Disable Default Shares 28. Encrypt Your Temp Folder 29. Clear the Paging File at Shutdown 30. Restrict Applications Available to Users Chapter 3. Network Security 31. Detect ARP Spoofing 32. Create a Static ARP Table 33. Firewall with Netfilter 34. Firewall with OpenBSD's PacketFilter 35. Create an Authenticated Gateway 36. Firewall with Windows 37. Keep Your Network Self-Contained 38. Test Your Firewall 39. MAC Filtering with Netfilter 40. Block OS Fingerprinting 41. Fool Remote Operating System Detection Software 42. Keep an Inventory of Your Network 43. Scan Your Network for Vulnerabilities 44. Keep Server Clocks Synchronized 45. Create Your Own Certificate Authority 46. Distribute Your CA to Clients 47. Encrypt IMAP and POP with SSL 48. Set Up TLS-Enabled SMTP 49. Detect Ethernet Sniffers Remotely 50. Install Apache with SSL and suEXEC 51. Secure BIND 52. Secure MySQL 53. Share Files Securely in Unix Chapter 4. Logging 54. Run a Central Syslog Server 55. Steer Syslog 56. Integrate Windows into Your Syslog Infrastructure 57. Automatically Summarize Your Logs 58. Monitor Your Logs Automatically 59. Aggregate Logs from Remote Sites 60. Log User Activity with Process Accounting Chapter 5. Monitoring and Trending 61. Monitor Availability 62. Graph Trends 63. Run ntop for Real-Time Network Stats 64. Audit Network Traffic 65. Collect Statistics with Firewall Rules 66. Sniff the Ether Remotely Chapter 6. Secure Tunnels 67. Set Up IPsec Under Linux 68. Set Up IPsec Under FreeBSD 69. Set Up IPsec in OpenBSD 70. PPTP Tunneling 71. Opportunistic Encryption with FreeS/WAN 72. Forward and Encrypt Traffic with SSH 73. Quick Logins with SSH Client Keys 74. Squid Proxy over SSH 75. Use SSH as a SOCKS Proxy 76. Encrypt and Tunnel Traffic with SSL 77. Tunnel Connections Inside HTTP 78. Tunnel with VTun and SSH 79. Automatic vtund.conf Generator 80. Create a Cross-Platform VPN
Responsibility: Andrew Lockhart.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/55506290> # Network security hacks
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "55506290" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1068309#Place/sebastopol_ca> ; # Sebastopol, CA
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/1751426> ; # Internet--Security measures
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1068309#Topic/reseaux_d_ordinateurs_mesures_de_surete> ; # Réseaux d'ordinateurs--Mesures de sûreté
    schema:about <http://experiment.worldcat.org/entity/work/data/1068309#Topic/computerbeveiliging> ; # Computerbeveiliging
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1068309#Topic/systemes_informatiques_mesures_de_surete> ; # Systèmes informatiques--Mesures de sûreté
    schema:about <http://id.loc.gov/authorities/subjects/sh2008104644> ; # Internet--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1068309#Topic/internet_mesures_de_surete> ; # Internet--Mesures de sûreté
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2004" ;
    schema:creator <http://viaf.org/viaf/40444505> ; # Andrew Lockhart
    schema:datePublished "2004" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1068309> ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/55204267> ;
    schema:name "Network security hacks"@en ;
    schema:productID "55506290" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/55506290#PublicationEvent/sebastopol_ca_o_reilly_2004> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1068309#Agent/o_reilly> ; # O'Reilly
    schema:url <http://books.google.com/books?id=VPhSAAAAMAAJ> ;
    schema:url <http://proquest.safaribooksonline.com/0596006438> ;
    schema:url <http://catalog.hathitrust.org/api/volumes/oclc/55204267.html> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/55506290> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1068309#Place/sebastopol_ca> # Sebastopol, CA
    a schema:Place ;
    schema:name "Sebastopol, CA" ;
    .

<http://experiment.worldcat.org/entity/work/data/1068309#Topic/computerbeveiliging> # Computerbeveiliging
    a schema:Intangible ;
    schema:name "Computerbeveiliging"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1068309#Topic/internet_mesures_de_surete> # Internet--Mesures de sûreté
    a schema:Intangible ;
    schema:name "Internet--Mesures de sûreté"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1068309#Topic/reseaux_d_ordinateurs_mesures_de_surete> # Réseaux d'ordinateurs--Mesures de sûreté
    a schema:Intangible ;
    schema:name "Réseaux d'ordinateurs--Mesures de sûreté"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1068309#Topic/systemes_informatiques_mesures_de_surete> # Systèmes informatiques--Mesures de sûreté
    a schema:Intangible ;
    schema:name "Systèmes informatiques--Mesures de sûreté"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2008104644> # Internet--Security measures
    a schema:Intangible ;
    schema:name "Internet--Security measures"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1751426> # Internet--Security measures
    a schema:Intangible ;
    schema:name "Internet--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/40444505> # Andrew Lockhart
    a schema:Person ;
    schema:familyName "Lockhart" ;
    schema:givenName "Andrew" ;
    schema:name "Andrew Lockhart" ;
    .

<http://www.worldcat.org/oclc/55204267>
    a schema:CreativeWork ;
    rdfs:label "Network security hacks." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/55506290> ; # Network security hacks
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.