Books & Videos

Table of Contents

  1. Computer Security Basics

    1. Chapter 1 Introduction: Some Fundamental Questions

      1. What Is Computer Security?
      2. What Is an Operating System?
      3. What Is a Deployment Environment?
      4. Summary
    2. Chapter 2 Unix History and Lineage

      1. History of Unix
      2. Security and Unix
      3. Role of This Book
      4. Summary
    3. Chapter 3 Policies and Guidelines

      1. Planning Your Security Needs
      2. Risk Assessment
      3. Cost-Benefit Analysis and Best Practices
      4. Policy
      5. Compliance Audits
      6. Outsourcing Options
      7. The Problem with Security Through Obscurity
      8. Summary
  2. Security Building Blocks

    1. Chapter 4 Users, Passwords, and Authentication

      1. Logging in with Usernames and Passwords
      2. The Care and Feeding of Passwords
      3. How Unix Implements Passwords
      4. Network Account and Authorization Systems
      5. Pluggable Authentication Modules (PAM)
      6. Summary
    2. Chapter 5 Users, Groups, and the Superuser

      1. Users and Groups
      2. The Superuser (root)
      3. The su Command: Changing Who You Claim to Be
      4. Restrictions on the Superuser
      5. Summary
    3. Chapter 6 Filesystems and Security

      1. Understanding Filesystems
      2. File Attributes and Permissions
      3. chmod: Changing a File’s Permissions
      4. The umask
      5. SUID and SGID
      6. Device Files
      7. Changing a File’s Owner or Group
      8. Summary
    4. Chapter 7 Cryptography Basics

      1. Understanding Cryptography
      2. Symmetric Key Algorithms
      3. Public Key Algorithms
      4. Message Digest Functions
      5. Summary
    5. Chapter 8 Physical Security for Servers

      1. Planning for the Forgotten Threats
      2. Protecting Computer Hardware
      3. Preventing Theft
      4. Protecting Your Data
      5. Story: A Failed Site Inspection
      6. Summary
    6. Chapter 9 Personnel Security

      1. Background Checks
      2. On the Job
      3. Departure
      4. Other People
      5. Summary
  3. Network and Internet Security

    1. Chapter 10 Modems and Dialup Security

      1. Modems: Theory of Operation
      2. Modems and Security
      3. Modems and Unix
      4. Additional Security for Modems
      5. Summary
    2. Chapter 11 TCP/IP Networks

      1. Networking
      2. IP: The Internet Protocol
      3. IP Security
      4. Summary
    3. Chapter 12 Securing TCP and UDP Services

      1. Understanding Unix Internet Servers and Services
      2. Controlling Access to Servers
      3. Primary Unix Network Services
      4. Managing Services Securely
      5. Putting It All Together: An Example
      6. Summary
    4. Chapter 13 Sun RPC

      1. Remote Procedure Call (RPC)
      2. Secure RPC (AUTH_DES)
      3. Summary
    5. Chapter 14 Network-Based Authentication Systems

      1. Sun’s Network Information Service (NIS)
      2. Sun’s NIS+
      3. Kerberos
      4. LDAP
      5. Other Network Authentication Systems
      6. Summary
    6. Chapter 15 Network Filesystems

      1. Understanding NFS
      2. Server-Side NFS Security
      3. Client-Side NFS Security
      4. Improving NFS Security
      5. Some Last Comments on NFS
      6. Understanding SMB
      7. Summary
    7. Chapter 16 Secure Programming Techniques

      1. One Bug Can Ruin Your Whole Day . . .
      2. Tips on Avoiding Security-Related Bugs
      3. Tips on Writing Network Programs
      4. Tips on Writing SUID/SGID Programs
      5. Using chroot( )
      6. Tips on Using Passwords
      7. Tips on Generating Random Numbers
      8. Summary
  4. Secure Operations

    1. Chapter 17 Keeping Up to Date

      1. Software Management Systems
      2. Updating System Software
      3. Summary
    2. Chapter 18 Backups

      1. Why Make Backups?
      2. Backing Up System Files
      3. Software for Backups
      4. Summary
    3. Chapter 19 Defending Accounts

      1. Dangerous Accounts
      2. Monitoring File Format
      3. Restricting Logins
      4. Managing Dormant Accounts
      5. Protecting the root Account
      6. One-Time Passwords
      7. Administrative Techniques for Conventional Passwords
      8. Intrusion Detection Systems
      9. Summary
    4. Chapter 20 Integrity Management

      1. The Need for Integrity
      2. Protecting Integrity
      3. Detecting Changes After the Fact
      4. Integrity-Checking Tools
      5. Summary
    5. Chapter 21 Auditing, Logging, and Forensics

      1. Unix Log File Utilities
      2. Process Accounting: The acct/pacct File
      3. Program-Specific Log Files
      4. Designing a Site-Wide Log Policy
      5. Handwritten Logs
      6. Managing Log Files
      7. Unix Forensics
      8. Summary
  5. Handling Security Incidents

    1. Chapter 22 Discovering a Break-in

      1. Prelude
      2. Discovering an Intruder
      3. Cleaning Up After the Intruder
      4. Case Studies
      5. Summary
    2. Chapter 23 Protecting Against Programmed Threats

      1. Programmed Threats: Definitions
      2. Damage
      3. Authors
      4. Entry
      5. Protecting Yourself
      6. Preventing Attacks
      7. Summary
    3. Chapter 24 Denial of Service Attacks and Solutions

      1. Types of Attacks
      2. Destructive Attacks
      3. Overload Attacks
      4. Network Denial of Service Attacks
      5. Summary
    4. Chapter 25 Computer Crime

      1. Your Legal Options After a Break-in
      2. Criminal Hazards
      3. Criminal Subject Matter
      4. Summary
    5. Chapter 26 Who Do You Trust?

      1. Can You Trust Your Computer?
      2. Can You Trust Your Suppliers?
      3. Can You Trust People?
      4. Summary
  6. Appendixes

    1. Appendix Unix Security Checklist

      1. Preface
      2. Chapter 1: Introduction: Some Fundamental Questions
      3. Chapter 2: Unix History and Lineage
      4. Chapter 3: Policies and Guidelines
      5. Chapter 4: Users, Passwords, and Authentication
      6. Chapter 5: Users, Groups, and the Superuser
      7. Chapter 6: Filesystems and Security
      8. Chapter 7: Cryptography Basics
      9. Chapter 8: Physical Security for Servers
      10. Chapter 9: Personnel Security
      11. Chapter 10: Modems and Dialup Security
      12. Chapter 11: TCP/IP Networks
      13. Chapter 12: Securing TCP and UDP Services
      14. Chapter 13: Sun RPC
      15. Chapter 14: Network-Based Authentication Systems
      16. Chapter 15: Network Filesystems
      17. Chapter 16: Secure Programming Techniques
      18. Chapter 17: Keeping Up to Date
      19. Chapter 18: Backups
      20. Chapter 19: Defending Accounts
      21. Chapter 20: Integrity Management
      22. Chapter 21: Auditing, Logging, and Forensics
      23. Chapter 22: Discovering a Break-In
      24. Chapter 23: Protecting Against Programmed Threats
      25. Chapter 24: Denial of Service Attacks and Solutions
      26. Chapter 25: Computer Crime
      27. Chapter 26: Who Do You Trust?
      28. Appendix A: Unix Security Checklist
      29. Appendix B: Unix Processes
      30. Appendixes C, D, and E: Paper Sources, Electronic Sources, and Organizations
    2. Appendix Unix Processes

      1. About Processes
      2. Signals
      3. Controlling and Examining Processes
      4. Starting Up Unix and Logging In
    3. Appendix Paper Sources

      1. Unix Security References
      2. Other Computer References
    4. Appendix Electronic Resources

      1. Mailing Lists
      2. Web Sites
      3. Usenet Groups
      4. Software Resources
    5. Appendix Organizations

      1. Professional Organizations
      2. U.S. Government Organizations
      3. Emergency Response Organizations
  1. Colophon