Books & Videos

Table of Contents

  1. Chapter 1 Threat Modeling and Risk Management

    1. Components of Risk

    2. Simple Risk Analysis: ALEs

    3. An Alternative: Attack Trees

    4. Defenses

    5. Conclusion

    6. Resources

  2. Chapter 2 Designing Perimeter Networks

    1. Some Terminology

    2. Types of Firewall and DMZ Architectures

    3. Deciding What Should Reside on the DMZ

    4. Allocating Resources in the DMZ

    5. The Firewall

  3. Chapter 3 Hardening Linux

    1. OS Hardening Principles

    2. Automated Hardening with Bastille Linux

  4. Chapter 4 Secure Remote Administration

    1. Why It’s Time to Retire Clear-Text Admin Tools

    2. Secure Shell Background and Basic Use

    3. Intermediate and Advanced SSH

    4. Other Handy Tools

  5. Chapter 5 Tunneling

    1. Stunnel and OpenSSL: Concepts

  6. Chapter 6 Securing Domain Name Services (DNS)

    1. DNS Basics

    2. DNS Security Principles

    3. Selecting a DNS Software Package

    4. Securing BIND

    5. djbdns

    6. Resources

  7. Chapter 7 Securing Internet Email

    1. Background: MTA and SMTP Security

    2. Using SMTP Commands to Troubleshoot and Test SMTP Servers

    3. Securing Your MTA

    4. Sendmail

    5. Postfix

    6. Resources

  8. Chapter 8 Securing Web Services

    1. Web Server Security

    2. Build Time: Installing Apache

    3. Setup Time: Configuring Apache

    4. Runtime: Securing CGI Scripts

    5. Special Topics

    6. Other Servers and Web Security

  9. Chapter 9 Securing File Services

    1. FTP Security

    2. Other File-Sharing Methods

    3. Resources

  10. Chapter 10 System Log Management and Monitoring

    1. syslog

    2. Syslog-ng

    3. Testing System Logging with logger

    4. Managing System-Log Files

    5. Using Swatch for Automated Log Monitoring

    6. Resources

  11. Chapter 11 Simple Intrusion Detection Techniques

    1. Principles of Intrusion Detection Systems

    2. Using Tripwire

    3. Other Integrity Checkers

    4. Snort

    5. Resources

  1. Appendix Two Complete Iptables Startup Scripts

  2. Colophon