By Kurt Seifried [email protected], Copyright Kurt Seifried 2001. License is here. Chapters with listed sections are "completed", the rest is still being rewritten.
I will be speaking at CSICON, August 19-21, Calgary, Alberta, Canada
Latest major update: Introduction to computer security
About this book
Acknowledgements
Contacts and
mailing lists
Typographical conventions
Errata and bugs
What is computer security?
Security Policy
Acceptable
Use Policy
Privacy Policy
Security as a process
Defense in
depth
Technical problems
Verifying packages and files
Installation
media
Automating installs
Filesystem layout
and structuring
Hardening your installation
Summary
Physical security
Console security
Summary
Overview
Local tools
WWW based tools
Other
network based tools
Non-commercial backup programs for Linux
Commercial
backup programs for Linux
Backup media
Basic file commands
Secure file deletion
Access
control lists (ACL’s)
Critical system configuration
files
File encryption
Filesystem encryption
Hiding data
PAM
Authentication services
Passwords
Cracking
passwords
Password storage
Baselines
File system monitoring
Network monitoring
/ attack detection
Intrusion Detection Papers
Dealing with
attacks
Packet sniffers
Packet sniffer detection
Host scanners
Network scanners
Application level
Scanners
Exploits
Firewalling concepts
Firewalling
with IPTables (Linux Kernel 2.4 and 2.5)
Firewalling with
IPChains (Linux Kernel 2.2, 2.3, 2.4 and 2.5)
Firewalling with
IPFWADM (Linux Kernel 2.0)
Limiting users
Monitoring users
Last updated on 1/10/2001
Copyright Kurt Seifried 2001 [email protected]