Books & Videos

Table of Contents

  1. Chapter 1 Threat Modeling and Risk Management

    1. Components of Risk

    2. Simple Risk Analysis: ALEs

    3. An Alternative: Attack Trees

    4. Defenses

    5. Conclusion

    6. Resources

  2. Chapter 2 Designing Perimeter Networks

    1. Some Terminology

    2. Types of Firewall and DMZ Architectures

    3. Deciding What Should Reside on the DMZ

    4. Allocating Resources in the DMZ

    5. The Firewall

  3. Chapter 3 Hardening Linux and Using iptables

    1. OS Hardening Principles

    2. Automated Hardening with Bastille Linux

  4. Chapter 4 Secure Remote Administration

    1. Why It's Time to Retire Cleartext Admin Tools

    2. Secure Shell Background and Basic Use

    3. Intermediate and Advanced SSH

  5. Chapter 5 OpenSSL and Stunnel

    1. Stunnel and OpenSSL: Concepts

  6. Chapter 6 Securing Domain Name Services (DNS)

    1. DNS Basics

    2. DNS Security Principles

    3. Selecting a DNS Software Package

    4. Securing BIND

    5. djbdns

    6. Resources

  7. Chapter 7 Using LDAP for Authentication

    1. LDAP Basics

    2. Setting Up the Server

    3. LDAP Database Management

    4. Conclusions

    5. Resources

  8. Chapter 8 Database Security

    1. Types of Security Problems

    2. Server Location

    3. Server Installation

    4. Database Operation

    5. Resources

  9. Chapter 9 Securing Internet Email

    1. Background: MTA and SMTP Security

    2. Using SMTP Commands to Troubleshootand Test SMTP Servers

    3. Securing Your MTA

    4. Sendmail

    5. Postfix

    6. Mail Delivery Agents

    7. A Brief Introduction to Email Encryption

    8. Resources

  10. Chapter 10 Securing Web Servers

    1. Web Security

    2. The Web Server

    3. Web Content

    4. Web Applications

    5. Layers of Defense

    6. Resources

  11. Chapter 11 Securing File Services

    1. FTP Security

    2. Other File-Sharing Methods

    3. Resources

  12. Chapter 12 System Log Management and Monitoring

    1. syslog

    2. Syslog-ng

    3. Testing System Logging with logger

    4. Managing System Logfiles with logrotate

    5. Using Swatch for Automated Log Monitoring

    6. Some Simple Log-Reporting Tools

    7. Resources

  13. Chapter 13 Simple Intrusion Detection Techniques

    1. Principles of Intrusion Detection Systems

    2. Using Tripwire

    3. Other Integrity Checkers

    4. Snort

    5. Resources

  1. Appendix A Two Complete iptables Startup Scripts

  2. Colophon