- Securing Network Services
- Turning Kernel Network Parameters
- References and Related Resources
- Ordering Sun Documents
- Accessing Sun Documentation Online
References and Related Resources
Publications
Hatch, Brian, and Osborne, James Lee. Hacking Linux Exposed, Second Edition McGraw-Hill, ISBN: 0072225645, November 2002.
Nemeth, Evi, Snyder, Garth, Seebass, Scott, and Hein, Trent R. UNIX System Administration Handbook, 3rd Edition, Prentice Hall PTR, ISBN: 0130206016, August 2000.
-
Noordergraaf, Alex. "Solaris Operating Environment Network Settings for Security: Updated for Solaris 9 Operating Environment," Sun BluePrints OnLine, June 2003, http://www.sun.com/solutions/blueprints/0603/816-5240.html.
-
Noordergraaf, Alex and Watson, Keith. "Solaris Operating Environment Security: Updated for the Solaris 9 Operating Environment," Sun BluePrints OnLine, December 2002, http://www.sun.com/solutions/blueprints/1202/816-5242.pdf.
Red Hat Linux 9: Red Hat Linux Security Guide, Red Hat Inc., 2002.
-
Reid, Jason. "Building OpenSSH - Tools and Tradeoffs," Sun BluePrints OnLine, January 2003, http://www.sun.com/blueprints/0103/817-1307.pdf.
-
Reid, Jason. "Configuring the Secure Shell Software," Sun BluePrints OnLine, April 2003, http://www.sun.com/blueprints/0403/817-2485.pdf.
-
Reid, Jason. "Integrating the Secure Shell Software," Sun BluePrints OnLine, May 2003, http://www.sun.com/blueprints/0503/817-2821.pdf.
Stevens, Richard W. TCP/IP Illustrated, Volume 1, 1st Edition, Addison-Wesley Publishing Company, ISBN: 0201633469, January 1994.
Web Sites
NOTE
Sun is not responsible for the availability of third-party Web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other material on or available from such sites or resources. Sun will not be responsible or liable for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through any such sites or resources.
-
Center for Internet Security - Linux Benchmark http://www.cisecurity.org/
-
OpenSSH tool: http://www.openssh.com/
-
Sendmail Consortium: sendmail configuration information, http://www.sendmail.org/
-
SSH Communications Security, Secure Shell (SSH) tool: http://www.ssh.com/
-
Sun BluePrints: http://www.sun.com/blueprints
-
TCP Wrappers tool, Wietse Venema: ftp://ftp.porcupine.org/pub/security/index.html