Books & Videos

Table of Contents

  1. Security Foundation

    1. Chapter 1 The Big Picture

      1. What Is System Security?
      2. Identifying Risks
      3. Responding to Risk
      4. Security Process and Principles
      5. System Security Principles
      6. Wrapping Up
      7. Resources
    2. Chapter 2 BSD Security Building Blocks

      1. Filesystem Protections
      2. Tweaking a Running Kernel: sysctl
      3. The Basic Sandbox: chroot
      4. Jail: Beyond chroot
      5. Inherent Protections
      6. OS Tuning
      7. Wrapping Up
      8. Resources
    3. Chapter 3 Secure Installation and Hardening

      1. General Concerns
      2. Installing FreeBSD
      3. FreeBSD Hardening: Your First Steps
      4. Installing OpenBSD
      5. OpenBSD Hardening: Your First Steps
      6. Post-Upgrade Hardening
      7. Wrapping Up
      8. Resources
    4. Chapter 4 Secure Administration Techniques

      1. Access Control
      2. Security in Everyday Tasks
      3. Upgrading
      4. Security Vulnerability Response
      5. Network Service Security
      6. Monitoring System Health
      7. Wrapping Up
      8. Resources
  2. Deployment Situations

    1. Chapter 5 Creating a Secure DNS Server

      1. The Criticality of DNS
      2. DNS Software
      3. Installing BIND
      4. Installing djbdns
      5. Operating BIND
      6. Operating djbdns
      7. Wrapping Up
      8. Resources
    2. Chapter 6 Building Secure Mail Servers

      1. Mail Server Attacks
      2. Mail Architecture
      3. Mail and DNS
      4. SMTP
      5. Mail Server Configurations
      6. Sendmail
      7. Postfix
      8. qmail
      9. Mail Access
      10. Wrapping Up
      11. Resources
    3. Chapter 7 Building a Secure Web Server

      1. Web Server Attacks
      2. Web Architecture
      3. Apache
      4. thttpd
      5. Advanced Web Servers with Jails
      6. Wrapping Up
      7. Resources
    4. Chapter 8 Firewalls

      1. Firewall Architectures
      2. Host Lockdown
      3. The Options: IPFW Versus PF
      4. Basic IPFW Configuration
      5. Basic PF Configuration
      6. Handling Failure
      7. Wrapping Up
      8. Resources
    5. Chapter 9 Intrusion Detection

      1. No Magic Bullets
      2. IDS Architectures
      3. NIDS on BSD
      4. Snort
      5. ACID
      6. HIDS on BSD
      7. Wrapping Up
      8. Resources
  3. Auditing and Incident Response

    1. Chapter 10 Managing the Audit Trails

      1. System Logging
      2. Logging via syslogd
      3. Securing a Loghost
      4. logfile Management
      5. Automated Log Monitoring
      6. Automated Auditing Scripts
      7. Wrapping Up
      8. Resources
    2. Chapter 11 Incident Response and Forensics

      1. Incident Response
      2. Forensics on BSD
      3. Digging Deeper with the Sleuth Kit
      4. Wrapping Up
      5. Resources
  1. Colophon