Author: Michael Rash
Publisher: No Starch Press
Release Date: 2007
Addressing the firewall capabilities of Linux, a handbook for security professionals describes the Netfilter infrastruction in the Linux kernel and explains how to use Netfilter as an intrusion detection system by integrating it with custom open source software and Snort rulesets, discussin such topics as Linux firewall log analysis and policies, passive network authentication and authorization, and more. Original. (Intermediate)
Author: Gregor N. Purdy
Publisher: "O'Reilly Media, Inc."
Release Date: 2004-08-25
Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered onLinux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications,followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.
The Definitive Guide to Building Firewalls with Linux As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security. An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more. Distribution neutral throughout, this edition is fully updated for today's Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you're a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise. Inside, you'll find just what you need to Install, configure, and update a Linux firewall running either iptables or nftables Migrate to nftables, or take advantage of the latest iptables enhancements Manage complex multiple firewall configurations Create, debug, and optimize firewall rules Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions Harden systems against port scanning and other attacks Uncover exploits such as rootkits and backdoors with chkrootkit
Author: Roderick W. Smith
Publisher: John Wiley & Sons
Release Date: 2011-05-09
The first book to cover the LPIC-2 certification Linux allows developers to update source code freely, making it an excellent, low-cost, secure alternative to alternate, more expensive operating systems. It is for this reason that the demand for IT professionals to have an LPI certification is so strong. This study guide provides unparalleled coverage of the LPIC-2 objectives for exams 201 and 202. Clear and concise coverage examines all Linux administration topics while practical, real-world examples enhance your learning process. On the CD, you’ll find the Sybex Test Engine, electronic flashcards, and a glossary containing the most important terms you need to understand.. Prepares you for exams 201 and 202 of the Linux Professional Institute Certification Offers clear, concise coverage on exam topics such as the Linux kernel, system startup, networking configuration, system maintenance, domain name server, file sharing, and more Addresses additional key topics for the exams including network client management, e-mail services, system security, and troubleshooting This must-have study guide serves as an invaluable roadmap to attaining LPI certification.
Building Linux Virtual Private Networks (VPNs) covers the most popular VPN technologies available for the Linux platform. In the early chapters the theory behind VPNs is discussed, including needs and uses. Common network and host configurations are also covered. Subsequent chapters drill down into the implementation and configuration of specific software packages. Specific, detailed instructions are included as well as troubleshooting information. This book will be an indispensable resource for anyone who wants to implement a Linux-based VPN. This book will meet the needs of anyone, from the Linux user to the experienced administrator to the security professional. --Oleg Kolesnikov
This introduction to networking on Linux now covers firewalls, including the use of ipchains and Netfilter, masquerading, and accounting. Other new topics in this second edition include Novell (NCP/IPX) support and INN (news administration).
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. A concise guide full of step-by-step recipes to help you learn how to generate and configure an embedded Linux system using Buildroot.Instant Buildroot is for developers who want to know how to use Buildroot tools to generate and configure their own embedded system. It is assumed that the reader has some experience with Linux and basic programming and is familiar with basic hardware development boards.
* The Definitive Guide to Apache mod_rewrite is the first book devoted to mastering mod_rewrite, Apache’s most powerful (and confusing) module. * It is authored by noted Apache expert and Apache Software Foundation member Rich Bowen, who draws on several years of extensive experience administering the Apache server as well as speaking and writing regularly on the topic. * This book covers all matters pertinent to mod_rewrite: installation and configuration, basic and conditional rewrites, access control, maintaining virtual hosts, and proxying.
Learn the ways of the Japanese Bushido Code with this very readable, modern translation of the Bushido Shoshinshu. Code of the Samurai is a four-hundred-year-old explication of the rules and expectations embodied in Bushido, the Japanese Way of the Warrior. Bushido has played a major role in shaping the behavior of modern Japanese government, corporations, society, and individuals, as well as in shaping modern Japanese martial arts within Japan and internationally. The Japanese original of this book, Bushido Shoshinshu, (Bushido for Beginners), has been one of the primary sources on the tenets of Bushido, a way of thought that remains fascinating and relevant to the modern world, East and West. This handbook, written after five hundred years of military rule in Japan, was composed to provide practical and moral instruction for warriors, correcting wayward tendencies and outlining the personal, social, and professional standards of conduct characteristic of Bushido, the Japanese chivalric tradition. With a clear, conversational narrative by Thomas Cleary, one of the foremost translators of the wisdom of Asia, and powerfully evocative line drawings by master illustrator Oscar Ratti, this book is indispensable to the corporate executive, student of the Asian Culture, martial artist, those interested in Eastern philosophy or military strategy, as well as for those simply interested in Japan and its people.
Author: David N. Blank-Edelman
Publisher: "O'Reilly Media, Inc."
Release Date: 2009-05-14
If you do systems administration work of any kind, you have to deal with the growing complexity of your environment and increasing demands on your time. Automating System Administration with Perl, Second Edition, not only offers you the right tools for your job, but also suggests the best way to approach specific problems and to securely automate recurring tasks. Updated and expanded to cover the latest operating systems, technologies, and Perl modules, this edition of the "Otter Book" will help you: Manage user accounts Monitor filesystems and processes Work with configuration files in important formats such as XML and YAML Administer databases, including MySQL, MS-SQL, and Oracle with DBI Work with directory services like LDAP and Active Directory Script email protocols and spam control Effectively create, handle, and analyze log files Administer network name and configuration services, including NIS, DNS and DHCP Maintain, monitor, and map network services, using technologies and tools such as SNMP, nmap, libpcap, GraphViz and RRDtool Improve filesystem, process, and network security This edition includes additional appendixes to get you up to speed on technologies such as XML/XPath, LDAP, SNMP, and SQL. With this book in hand and Perl in your toolbox, you can do more with less -- fewer resources, less effort, and far less hassle.