Table of contents for Hardening Linux / John H. Terpstra ... [et al.]


Bibliographic record and links to related information available from the Library of Congress catalog


Information from electronic data provided by the publisher. May be incomplete or contain other coding.


Counter
Part I: Do These Seven Things First
Chapter 1: Critical First Steps
Part II: Take It From The Top: The Systematic Hardening Process
Chapter 2: Hardening Network Access: Disable
Unnecessary Services
Chapter 3: Installing Firewalls and Filters
Chapter 4: Hardening Software Accessibility
Chapter 5: Preparing for Disaster
Chapter 6: Hardening Access Controls
Chapter 7: Hardening Data Storage
Chapter 8: Hardening Authentication and User Identity
Chapter 9: Restricted Execution Environments
Chapter 10: Hardening Communications
Part III: Once Is Never Enough!
Chapter 11: Install Network Monitoring Software
Chapter 12: Automatic Logfile Scanning
Chapter 13: Patch Management and Monitoring
Chapter 14: Self-Monitoring Tools
Part IV: How to Succeed at Hardening Linux
Chapter 15: Budget Acquisition and Corporate
Commitment to Security
Chapter 16: Establishing a Security Campaign
Appendix A: Additional Linux Security Resources



Library of Congress subject headings for this publication: Linux, Operating systems (Computers)Computer networks, Software maintenance, Computer networks Security measures