search for books and compare prices
Tables of Contents for Practical Unix and Internet Security
Chapter/Section Title
Page #
Page Count
Preface
xiii
 
I: Computer Security Basics
1
46
Introduction
3
20
What Is Computer Security?
6
1
What Is an Operating System?
7
1
History of UNIX
8
7
Security and UNIX
15
5
Role of This Book
20
3
Policies and Guidelines
23
24
Planning Your Security Needs
24
3
Risk Assessment
27
3
Cost-Benefit Analysis
30
5
Policy
35
5
The Problem with Security Through Obscurity
40
7
II: User Responsibilities
47
148
Users and Passwords
49
22
Usernames
49
2
Passwords
51
6
Entering Your Password
57
1
Changing Your Password
58
1
Verifying Your New Password
59
2
The Care and Feeding of Passwords
61
6
One-Time Passwords
67
1
Summary
68
3
Users, Groups, and the Superuser
71
20
Users and Groups
71
7
Special Usernames
78
6
su: Changing Who You Claim to Be
84
6
Summary
90
1
The UNIX Filesystem
91
48
Files
91
9
Using File Permissions
100
13
The umask
113
2
Using Directory Permissions
115
3
SUID
118
10
Device Files
128
4
chown: Changing a File's Owner
132
2
chgrp: Changing a File's Group
134
1
Oddities and Dubious Ideas
134
3
Summary
137
2
Cryptography
139
56
A Brief History of Cryptography
139
3
What Is Encryption?
142
5
The Enigma Encryption System
147
2
Common Cryptographic Algorithms
149
18
Message Digests and Digital Signatures
167
8
Encryption Programs Available for UNIX
175
3
des: The Data Encryption Standard
178
12
Encryption and U.S. Law
190
5
III: System Security
195
202
Backups
197
28
Make Backups!
198
12
Sample Backup Strategies
210
5
Backing Up System Files
215
3
Software for Backups
218
7
Defending Your Accounts
225
46
Dangerous Accounts
225
10
Monitoring File Format
235
1
Restricting Logins
236
1
Managing Dormant Accounts
237
6
Protecting the root Account
243
3
The UNIX Encrypted Password System
246
4
One-Time Passwords
250
5
Administrative Techniques for Conventional Passwords
255
16
Integrity Management
271
18
Prevention
273
4
Detecting Change
277
9
A Final Note
286
3
Auditing and Logging
289
38
The Basic Log Files
290
9
The acct/pacct Process Accounting File
299
3
Program-Specific Log Files
302
5
Per-User Trails in the Filesystem
307
2
The UNIX System Log (syslog) Facility
309
9
Swatch: A Log File Tool
318
3
Handwritten Logs
321
3
Managing Log Files
324
3
Protecting Against Programmed Threats
327
30
Programmed Threats: Definitions
327
10
Damage
337
1
Authors
338
1
Entry
339
2
Protecting Yourself
341
12
Protecting Your System
353
4
Physical Security
357
32
One Forgotten Threat
357
2
Protecting Computer Hardware
359
16
Protecting Data
375
11
Story: A Failed Site Inspection
386
3
Personnel Security
389
8
Background Checks
390
1
On the Job
391
4
Outsiders
395
2
IV: Network and Internet Security
397
238
Telephone Security
399
22
Modems: Theory of Operation
399
2
Serial Interfaces
401
1
The RS-232 Serial Protocol
401
4
Modems and Security
405
6
Modems and UNIX
411
8
Additional Security for Modems
419
2
UUCP
421
28
About UUCP
422
4
Versions of UUCP
426
1
UUCP and Security
427
3
Security in Version 2 UUCP
430
7
Security in BNU UUCP
437
7
Additional Security Concerns
444
1
Early Security Problems with UUCP
445
2
UUCP Over Networks
447
1
Summary
448
1
TCP/IP Networks
449
30
Networking
449
4
IPv4: The Internet Protocol Version 4
453
17
IP Security
470
7
Other Network Protocols
477
1
Summary
478
1
TCP/IP Services
479
58
Understanding UNIX Internet Servers
480
4
Controlling Access to Servers
484
1
Primary UNIX Network Services
485
45
Security Implications of Network Services
530
1
Monitoring Your Network with netstat
531
3
Network Scanning
534
1
Summary
535
2
WWW Security
537
28
Security and the World Wide Web
537
2
Running a Secure Server
539
10
Controlling Access to Files on Your Server
549
6
Avoiding the Risks of Eavesdropping
555
5
Risks of Web Browsers
560
3
Dependence on Third Parties
563
1
Summary
564
1
RPC, NIS, NIS+, and Kerberos
565
40
Securing Network Services
566
1
Sun's Remote Procedure Call (RPC)
567
3
Secure RPC (AUTH_DES)
570
9
Sun's Network Information Service (NIS)
579
8
Sun's NIS+
587
7
Kerberos
594
9
Other Network Authentication Systems
603
2
NFS
605
30
Understanding NFS
605
11
Server-Side NFS Security
616
5
Client-Side NFS Security
621
1
Improving NFS Security
622
9
Some Last Comments
631
4
V: Advanced Topics
635
94
Firewalls
637
32
What's a Firewall?
638
10
Building Your Own Firewall
648
4
Example: Cisco Systems Routers as Chokes
652
6
Setting Up the Gate
658
6
Special Considerations
664
2
Final Comments
666
3
Wrappers and Proxies
669
32
Why Wrappers?
669
1
sendmail (smap/smapd) Wrapper
670
5
tcpwrapper
675
12
SOCKS
687
10
UDP Relayer
697
1
Writing Your Own Wrappers
698
3
Writing Secure SUID and Network Programs
701
28
One Bug Can Ruin Your Whole Day
701
12
Tips on Writing Network Programs
713
3
Tips on Writing SUID/SGID Programs
716
3
Tips on Using Passwords
719
2
Tips on Generating Random Numbers
721
8
VI: Handling Security Incidents
729
88
Discovering a Break-in
731
28
Prelude
731
3
Discovering an Intruder
734
12
The Log Files: Discovering an Intruder's Tracks
746
1
Cleaning Up After the Intruder
747
5
An Example
752
3
Resuming Operation
755
1
Damage Control
756
3
Denial of Service Attacks and Solutions
759
20
Destructive Attacks
760
1
Overload Attacks
760
15
Network Denial of Service Attacks
775
4
Computer Security and U.S. Law
779
20
Legal Options After a Break-in
779
1
Criminal Prosecution
780
9
Civil Actions
789
2
Other Liability
791
8
Who Do You Trust?
799
18
Can You Trust Your Computer?
799
4
Can You Trust Your Suppliers?
803
7
Can You Trust People?
810
4
What All This Means
814
3
VII: Appendixes
817
120
A: UNIX Security Checklist
819
22
B: Important Files
841
18
Security-Related Devices and Files
841
7
Important Files in Your Home Directory
848
1
SUID and SGID Files
848
11
C: UNIX Processes
859
18
About Processes
859
9
Creating Processes
868
1
Signals
869
2
The kill Command
871
2
Starting Up UNIX and Logging In
873
4
D: Paper Sources
877
16
UNIX Security References
877
1
Other Computer References
878
11
Security Periodicals
889
4
E: Electronic Resources
893
16
Mailing Lists
894
3
Usenet Groups
897
1
WWW Pages
898
1
Software Resources
899
10
F: Organizations
909
16
Professional Organizations
909
4
U. S. Government Organizations
913
1
Emergency Response Organizations
914
11
G: Table of IP Services
925
12
Index
937