Network Security Hacks 2e
Home > Computing and Information Technology > Computer networking and communications > Network security > Network Security Hacks 2e
Network Security Hacks 2e

Network Security Hacks 2e

|
     0     
5
4
3
2
1




International Edition


About the Book

Tips & Tools for Protecting Your Privacy

Table of Contents:
Credits Preface Chapter 1. Unix Host Security 1. Secure Mount Points 2. Scan for SUID and SGID Programs 3. Scan for World- and Group-Writable Directories 4. Create Flexible Permissions Hierarchies with POSIX ACLs 5. Protect Your Logs from Tampering 6. Delegate Administrative Roles 7. Automate Cryptographic Signature Verification 8. Check for Listening Services 9. Prevent Services from Binding to an Interface 10. Restrict Services with Sandboxed Environments 11. Use proftpd with a MySQL Authentication Source 12. Prevent Stack-Smashing Attacks 13. Lock Down Your Kernel with grsecurity 14. Restrict Applications with grsecurity 15. Restrict System Calls with systrace 16. Create systrace Policies Automatically 17. Control Login Access with PAM 18. Restrict Users to SCP and SFTP 19. Use Single-Use Passwords for Authentication 20. Restrict Shell Environments 21. Enforce User and Group Resource Limits 22. Automate System Updates Chapter 2. Windows Host Security 23. Check Servers for Applied Patches 24. Use Group Policy to Configure Automatic Updates 25. List Open Files and Their Owning Processes 26. List Running Services and Open Ports 27. Enable Auditing 28. Enumerate Automatically Executed Programs 29. Secure Your Event Logs 30. Change Your Maximum Log File Sizes 31. Back Up and Clear the Event Logs 32. Disable Default Shares 33. Encrypt Your Temp Folder 34. Back Up EFS 35. Clear the Paging File at Shutdown 36. Check for Passwords That Never Expire Chapter 3. Privacy and Anonymity 37. Evade Traffic Analysis 38. Tunnel SSH Through Tor 39. Encrypt Your Files Seamlessly 40. Guard Against Phishing 41. Use the Web with Fewer Passwords 42. Encrypt Your Email with Thunderbird 43. Encrypt Your Email in Mac OS X Chapter 4. Firewalling 44. Firewall with Netfilter 45. Firewall with OpenBSD's PacketFilter 46. Protect Your Computer with the Windows Firewall 47. Close Down Open Ports and Block Protocols 48. Replace the Windows Firewall 49. Create an Authenticated Gateway 50. Keep Your Network Self-Contained 51. Test Your Firewall 52. MAC Filter with Netfilter 53. Block Tor Chapter 5. Encrypting and Securing Services 54. Encrypt IMAP and POP with SSL 55. Use TLS-Enabled SMTP with Sendmail 56. Use TLS-Enabled SMTP with Qmail 57. Install Apache with SSL and suEXEC 58. Secure BIND 59. Set Up a Minimal and Secure DNS Server 60. Secure MySQL 61. Share Files Securely in Unix Chapter 6. Network Security 62. Detect ARP Spoofing 63. Create a Static ARP Table 64. Protect Against SSH Brute-Force Attacks 65. Fool Remote Operating System Detection Software 66. Keep an Inventory of Your Network 67. Scan Your Network for Vulnerabilities 68. Keep Server Clocks Synchronized 69. Create Your Own Certificate Authority 70. Distribute Your CA to Clients 71. Back Up and Restore a Certificate Authority with Certificate Services 72. Detect Ethernet Sniffers Remotely 73. Help Track Attackers 74. Scan for Viruses on Your Unix Servers 75. Track Vulnerabilities Chapter 7. Wireless Security 76. Turn Your Commodity Wireless Routers into a Sophisticated Security Platform 77. Use Fine-Grained Authentication for Your Wireless Network 78. Deploy a Captive Portal Chapter 8. Logging 79. Run a Central Syslog Server 80. Steer Syslog 81. Integrate Windows into Your Syslog Infrastructure 82. Summarize Your Logs Automatically 83. Monitor Your Logs Automatically 84. Aggregate Logs from Remote Sites 85. Log User Activity with Process Accounting 86. Centrally Monitor the Security Posture of Your Servers Chapter 9. Monitoring and Trending 87. Monitor Availability 88. Graph Trends 89. Get Real-Time Network Stats 90. Collect Statistics with Firewall Rules 91. Sniff the Ether Remotely Chapter 10. Secure Tunnels 92. Set Up IPsec Under Linux 93. Set Up IPsec Under FreeBSD 94. Set Up IPsec in OpenBSD 95. Encrypt Traffic Automatically with Openswan 96. Forward and Encrypt Traffic with SSH 97. Automate Logins with SSH Client Keys 98. Use a Squid Proxy over SSH 99. Use SSH As a SOCKS Proxy 100. Encrypt and Tunnel Traffic with SSL 101. Tunnel Connections Inside HTTP 102. Tunnel with VTun and SSH 103. Generate VTun Configurations Automatically 104. Create a Cross-Platform VPN 105. Tunnel PPP Chapter 11. Network Intrusion Detection 106. Detect Intrusions with Snort 107. Keep Track of Alerts 108. Monitor Your IDS in Real Time 109. Manage a Sensor Network 110. Write Your Own Snort Rules 111. Prevent and Contain Intrusions with Snort_inline 112. Automatically Firewall Attackers with SnortSam 113. Detect Anomalous Behavior 114. Automatically Update Snort's Rules 115. Create a Distributed Stealth Sensor Network 116. Use Snort in High-Performance Environments with Barnyard 117. Detect and Prevent Web Application Intrusions 118. Scan Network Traffic for Viruses 119. Simulate a Network of Vulnerable Hosts 120. Record Honeypot Activity Chapter 12. Recovery and Response 121. Image Mounted Filesystems 122. Verify File Integrity and Find Compromised Files 123. Find Compromised Packages 124. Scan for Rootkits 125. Find the Owner of a Network Index


Best Sellers


Product Details
  • ISBN-13: 9780596527631
  • Publisher: O'Reilly Media
  • Publisher Imprint: O'Reilly Media
  • Height: 229 mm
  • No of Pages: 480
  • Returnable: 00
  • Spine Width: 26 mm
  • ISBN-10: 0596527632
  • Publisher Date: 05 Dec 2006
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Returnable: Y
  • Width: 153 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Network Security Hacks 2e
O'Reilly Media -
Network Security Hacks 2e
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Network Security Hacks 2e

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!