Table of contents for Hardening Linux / John H. Terpstra ... [et al.]

Bibliographic record and links to related information available from the Library of Congress catalog

Information from electronic data provided by the publisher. May be incomplete or contain other coding.

Part I: Do These Seven Things First
Chapter 1: Critical First Steps
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Hardening Network Access: Disable
Unnecessary Services
Chapter 3: Installing Firewalls and Filters
Chapter 4: Hardening Software Accessibility
Chapter 5: Preparing for Disaster
Chapter 6: Hardening Access Controls
Chapter 7: Hardening Data Storage
Chapter 8: Hardening Authentication and User Identity
Chapter 9: Restricted Execution Environments
Chapter 10: Hardening Communications
Part III: Once Is Never Enough!
Chapter 11: Install Network Monitoring Software
Chapter 12: Automatic Logfile Scanning
Chapter 13: Patch Management and Monitoring
Chapter 14: Self-Monitoring Tools
Part IV: How to Succeed at Hardening Linux
Chapter 15: Budget Acquisition and Corporate
Commitment to Security
Chapter 16: Establishing a Security Campaign
Appendix A: Additional Linux Security Resources

Library of Congress subject headings for this publication: Linux, Operating systems (Computers)Computer networks, Software maintenance, Computer networks Security measures