SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a small non-enterprise business user might take to protect themselves when dealing with what the attacker may gain and what a victim may lose. These steps include packet-level firewall filtering, IP masquerading, proxies, tcp wrappers, system integrity checking, and system security monitoring with an overall emphasis on filtering and protection. This book will provide a description of the need for security measures and solutions. The goal is to help people get their Internet security measures in place quickly, without the need to become an expert in security or firewalls.
Click below for Sample Chapter related to this title:
0735709009.pdf
1. Preliminary Concepts Underlying Packet-Filtering Firewalls.
2. Packet-Filtering Concepts.
3. Building and Installing a Firewall.
4. LAN Issues, Multiple Firewalls, and Perimeter Networks.
5. Debugging the Firewall Rules.
6. Verifying that the System Is Running as You Expect.
7. Issues At the UNIX System Administration Level.
8. Intrusion Detection and Incident Reporting.