SUSE LINUX Enterprise Server 9 Administrator's Handbook
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Operating systems > Open source and other operating systems > SUSE LINUX Enterprise Server 9 Administrator's Handbook
SUSE LINUX Enterprise Server 9 Administrator's Handbook

SUSE LINUX Enterprise Server 9 Administrator's Handbook


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through installing and securing a SLES 9 system, and it will focus on the specific security features that make SLES 9 an important platform for all system administrators. Some of what you will cover is: SuSE server installation User access and security Installing and configuring networking services Securing your SuSE server Leverage Linux and open source with SLES 9 and SUSE Linux Enterprise Server Administrator's Handbook to build a secure computing network for your company.

Table of Contents:
I. SUSE SERVER INSTALLATION AND CONFIGURATION. 1. Installing SUSE LINUX Enterprise Server.     Installation Methods and Overview.       CD-ROM–Based Installation.       VNC-Based Installation.       Network-Based Installation.       AutoYaST-Based Installation.     Pre-Installation Planning.     Ten Easy Steps to SLES 9 Installation.       Selecting an Installation Method.       Selecting the Language.       Choosing Installation Settings.       Preparing the Hard Disks.       Configuring the System.       Specifying Network Settings.       Applying Online Updates.       Configuring Services.       Configuring User Information.       Configuring Hardware.     Troubleshooting.     Summary. 2. Updating the Server.     Maintaining Your System Configuration.       SuSEconfig.       YaST (Yet another Setup Tool).     Adding and Removing Packages.       Installing a Package.       Removing a Package or Subcomponents.     Adding and Removing Hardware.       Preparations.       Adding a Disk.     Changing Network Configuration.       Network Parameters.       Using YaST to Manage the Network Configuration.     Summary. 3. Booting and Shutting Down the Server.     Boot Loaders.       LILO.       Grub.     Kernel Boot.     init and Understanding Runlevels.     System Shutdown.     Emergency Boot and Recovery.     Summary. II. USER ACCESS AND SECURITY MANAGEMENT. 4. User and Group Administration.     User and Group IDs.     User and Group Data Files.       The /etc/passwd File.       The /etc/shadow File.       The /etc/group File.     User Account and Group Management Applications.       Creating and Editing User Accounts.       Setting Default User Account Properties.       Creating and Editing Groups.     Security Considerations.       Using Strong Passwords.       Auditing Default Accounts.       The Root Account.       User in Too Many Groups?     Summary. 5. User Environment Management and Security.     Account Auditing.     Configuring the User Environment.       Default Shell.       Login Scripts and Environment Variables.     User Resource Management.       Authentication Using PAM.       PAM Module Configuration.       Resource Management.       Access Time Management.       Quota Management.     su or sudo.     Summary. 6. Filesystem Security.     A Review of File and Directory Permissions.       Changing Permissions.       Changing User and Group Ownership.       Security Considerations.     Default Access Permissions.     Special File Permissions.       Security Implications of SUID/SGID.       SGID and File Sharing.       A SUID Sample Program.       Securing Against SUID Programs.       Sticky Business.     Extended Attributes.     Data and Filesystem Encryption.     Secure File Deletion.     Journaled Filesystems.     Summary. 7. System Management and Monitoring.     Common Linux Commands.       Basic Commands.       Additional Tools.     The root Filesystem.     Health Checks and System Monitoring.       Machine Uptime.       Log Review.       Top Consumers.       Application Check.       System Resource Check.       User Login Activity.     System Tuning.       Tuning Kernel Parameters.       Tuning Filesystem Access.     Summary. III. INSTALLING AND CONFIGURING NETWORKING SERVICES. 8. Network Services.     Angels and Daemons.       Configuring xinetd.       The /etc/xinetd.conf File.       Applying Access Control.       Security Considerations.     Network Time Services.       Configuring the NTP Client.       Configuring an NTP Server.       Troubleshooting Tips.     Email Services.     File Transfer Services.       Using Pure-FTPd.       Using vsftpd.       Using the Standard TFTP Server.     Network File-Sharing Services.       Setting Up an NFS Server.       Setting Up a Samba Server.     Remote Management Services.       Telnet.       ssh.       VNC and XDMCP.       Securing System Management Conversations.       Restricting Connections by IP Address.       A Secure System Management Environment.     Network Name Services.       Samba.       Service Location Protocol (SLP).       Domain Name Service (DNS).       Dynamic Host Configuration Protocol (DHCP).       DNS and DHCP.     Web Services.     Authentication Services.       Network Information Services (NIS).       Samba Domains.       Lightweight Directory Access Protocol (LDAP).       Kerberos.     Summary. 9. Printing Services.     Printer Configuration.       Local Printers.       Network Printers.       Adding a Local Printer.       Adding a Network Printer.     Print Job Lifecycle.       Job Spooling.       Applying Filters.       Printing the Information.     Queue Management.       YaST Queue Configuration.       Command-Line Queue Configuration.       Printer Queue Basics.       The CUPS Web Interface.     Summary. 10. Data Backup and Disaster Recovery.     A Look at Backup Strategies.     Implementing a Backup Strategy.       Grandfather-Father-Son Rotation Method.       Tower of Hanoi Rotation Method.       Some Tips and Tricks.       Database Backups: Cold or Hot?     Backup and Restore Tools.       Making Tarballs.       Archiving Data with cpio.       Converting and Copying Data Using dd.       Using dump and restore.       Data Mirroring Using rsync.       YaST’s System Backup and Restore Modules.       Getting to Know AMANDA.       Scheduling Backups.       Commercial Backup Products.     SLES Boot and Rescue Disks.     Summary. IV. SECURING YOUR SUSE SERVER. 11. Network Security Concepts.     Corporate Security Policies.       Physical Security.       User Accounts.       Strong Passwords.       Remote Access.       Firewalls.       Acceptable Use Policy.       Information Protection.       Incident Response.     Summary. 12. Intrusion Detection.     Defining Intrusions.     Reducing Your Target Size.     Vulnerability Assessments.       nmap.       Nessus.     Detecting a Network-based Intrusion.       Know Your Traffic, Tune Your Firewall.       Network Intrusion Detection Systems.       Snort.       Analysis Console for Intrusion Databases.     Detecting a Host Intrusion.       Log Files.       chkrootkit.       Advanced Intrusion Detection Environment (AIDE).     Additional Tools.       Scan Detection Tools.       MRTG and Cacti.       Ethereal.     Summary. 13. System Security.     System Hardening Principles.     Using a Central syslog Server.       Hardening the Central Syslog Host.       A Stealth Logging Host.     Avoid Logging in As Root.     Securing Network Services.       Hardening Remote Services.       Limiting Rights of Services.       Using chroot Jails and User Mode Linux.       Packet Filtering Using iptables.       Hardening Your Physical Network Infrastructure.       Wireless Security.     System Hardening Packages.     Automating SLES Hardening.     Learning More About Threats.     Summary. V. APPENDIXES. Appendix A. Security Certifications. Appendix B. Resources.     Linux Editors.     Website Resources.       Security and Linux-Related Websites.       SUSE-Specific Newsgroups and Websites. Index.

About the Author :
Peter Kuo is a Novell Master CNI, Master CNE, NCIP, CNS and one of the first CDEs. He is the co-author of Novell's Guide to Troubleshooting NDS and has authored or coauthored several NetWare and networking titles.


Best Sellers


Product Details
  • ISBN-13: 9780672332685
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Novell Press
  • Language: English
  • ISBN-10: 067233268X
  • Publisher Date: 29 Jun 2005
  • Binding: Digital download


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
SUSE LINUX Enterprise Server 9 Administrator's Handbook
Pearson Education (US) -
SUSE LINUX Enterprise Server 9 Administrator's Handbook
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

SUSE LINUX Enterprise Server 9 Administrator's Handbook

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!