Shop now Shop now Shop now  Up to 70% Off Fashion  Shop all Amazon Fashion Cloud Drive Photos Shop now Learn More Shop now Shop now Shop Fire Shop Kindle Shop now Shop now
Mastering FreeBSD and OpenBSD Security and over 2 million other books are available for Amazon Kindle . Learn more

Buy New

or
Sign in to turn on 1-Click ordering.
Buy Used
Used - Good See details
Price: £17.25

or
 
   
More Buying Choices
Have one to sell? Sell yours here
Start reading Mastering FreeBSD and OpenBSD Security on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Mastering FreeBSD and OpenBSD Security [Paperback]

Yanek Korff , Paco Hope , Bruce Potter

Price: £33.50 Eligible for FREE UK Delivery Details
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 2 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it tomorrow, 24 July? Choose Express delivery at checkout. Details
‹  Return to Product Overview

Table of Contents

Preface; Audience; Assumptions This Book Makes; Contents of This Book; Conventions Used in This Book; Using Code Examples; Comments and Questions; Safari Enabled; Acknowledgments; Security Foundation; Chapter 1: The Big Picture; 1.1 What Is System Security?; 1.2 Identifying Risks; 1.3 Responding to Risk; 1.4 Security Process and Principles; 1.5 System Security Principles; 1.6 Wrapping Up; 1.7 Resources; Chapter 2: BSD Security Building Blocks; 2.1 Filesystem Protections; 2.2 Tweaking a Running Kernel: sysctl; 2.3 The Basic Sandbox: chroot; 2.4 Jail: Beyond chroot; 2.5 Inherent Protections; 2.6 OS Tuning; 2.7 Wrapping Up; 2.8 Resources; Chapter 3: Secure Installation and Hardening; 3.1 General Concerns; 3.2 Installing FreeBSD; 3.3 FreeBSD Hardening: Your First Steps; 3.4 Installing OpenBSD; 3.5 OpenBSD Hardening: Your First Steps; 3.6 Post-Upgrade Hardening; 3.7 Wrapping Up; 3.8 Resources; Chapter 4: Secure Administration Techniques; 4.1 Access Control; 4.2 Security in Everyday Tasks; 4.3 Upgrading; 4.4 Security Vulnerability Response; 4.5 Network Service Security; 4.6 Monitoring System Health; 4.7 Wrapping Up; 4.8 Resources; Deployment Situations; Chapter 5: Creating a Secure DNS Server; 5.1 The Criticality of DNS; 5.2 DNS Software; 5.3 Installing BIND; 5.4 Installing djbdns; 5.5 Operating BIND; 5.6 Operating djbdns; 5.7 Wrapping Up; 5.8 Resources; Chapter 6: Building Secure Mail Servers; 6.1 Mail Server Attacks; 6.2 Mail Architecture; 6.3 Mail and DNS; 6.4 SMTP; 6.5 Mail Server Configurations; 6.6 Sendmail; 6.7 Postfix; 6.8 qmail; 6.9 Mail Access; 6.10 Wrapping Up; 6.11 Resources; Chapter 7: Building a Secure Web Server; 7.1 Web Server Attacks; 7.2 Web Architecture; 7.3 Apache; 7.4 thttpd; 7.5 Advanced Web Servers with Jails; 7.6 Wrapping Up; 7.7 Resources; Chapter 8: Firewalls; 8.1 Firewall Architectures; 8.2 Host Lockdown; 8.3 The Options: IPFW Versus PF; 8.4 Basic IPFW Configuration; 8.5 Basic PF Configuration; 8.6 Handling Failure; 8.7 Wrapping Up; 8.8 Resources; Chapter 9: Intrusion Detection; 9.1 No Magic Bullets; 9.2 IDS Architectures; 9.3 NIDS on BSD; 9.4 Snort; 9.5 ACID; 9.6 HIDS on BSD; 9.7 Wrapping Up; 9.8 Resources; Auditing and Incident Response; Chapter 10: Managing the Audit Trails; 10.1 System Logging; 10.2 Logging via syslogd; 10.3 Securing a Loghost; 10.4 logfile Management; 10.5 Automated Log Monitoring; 10.6 Automated Auditing Scripts; 10.7 Wrapping Up; 10.8 Resources; Chapter 11: Incident Response and Forensics; 11.1 Incident Response; 11.2 Forensics on BSD; 11.3 Digging Deeper with the Sleuth Kit; 11.4 Wrapping Up; 11.5 Resources; Colophon;|

  • Preface
  • Security Foundation
    • Chapter 1: The Big Picture
    • Chapter 2: BSD Security Building Blocks
    • Chapter 3: Secure Installation and Hardening
    • Chapter 4: Secure Administration Techniques
  • Deployment Situations
    • Chapter 5: Creating a Secure DNS Server
    • Chapter 6: Building Secure Mail Servers
    • Chapter 7: Building a Secure Web Server
    • Chapter 8: Firewalls
    • Chapter 9: Intrusion Detection
  • Auditing and Incident Response
    • Chapter 10: Managing the Audit Trails
    • Chapter 11: Incident Response and Forensics
  • Colophon

‹  Return to Product Overview