Bibliographic record and links to related information available from the Library of Congress catalog
Information from electronic data provided by the publisher. May be incomplete or contain other coding.
Part I: Do These Seven Things First Chapter 1: Critical First Steps Part II: Take It From The Top: The Systematic Hardening Process Chapter 2: Hardening Network Access: Disable Unnecessary Services Chapter 3: Installing Firewalls and Filters Chapter 4: Hardening Software Accessibility Chapter 5: Preparing for Disaster Chapter 6: Hardening Access Controls Chapter 7: Hardening Data Storage Chapter 8: Hardening Authentication and User Identity Chapter 9: Restricted Execution Environments Chapter 10: Hardening Communications Part III: Once Is Never Enough! Chapter 11: Install Network Monitoring Software Chapter 12: Automatic Logfile Scanning Chapter 13: Patch Management and Monitoring Chapter 14: Self-Monitoring Tools Part IV: How to Succeed at Hardening Linux Chapter 15: Budget Acquisition and Corporate Commitment to Security Chapter 16: Establishing a Security Campaign Appendix A: Additional Linux Security Resources