Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems

- Autorzy:
- Yanek Korff, Paco Hope, Bruce Potter
- Promocja Przejdź


- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 466
- Dostępne formaty:
-
ePubMobi
Opis książki: Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
Wybrane bestsellery
-
Książka Testowanie bezpieczeństwa aplikacji internetowych. Receptury to napisany zrozumiałym językiem podręcznik, dzięki któremu szybko poznasz mechanizmy testowania zabezpieczeń. Praktyczne przykłady zawarte w tym przewodniku sprawią, że szybko nauczysz się włączać systemy zabezpieczeń do standa...
Testowanie bezpieczeństwa aplikacji internetowych. Receptury Testowanie bezpieczeństwa aplikacji internetowych. Receptury
(0,00 zł najniższa cena z 30 dni)24.50 zł
49.00 zł(-50%) -
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit test...
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
(0,00 zł najniższa cena z 30 dni)126.65 zł
149.00 zł(-15%) -
Przeczytasz o tym, jak wykrywać nowe luki w oprogramowaniu, jak tworzyć trojany i rootkity, a także jak używać techniki wstrzykiwania SQL. Zapoznasz się również z szeroką gamą narzędzi do przeprowadzania testów penetracyjnych (takich jak Metasploit Framework, mimikatz i BeEF), rozeznasz się w dzi...
Etyczny haking. Praktyczne wprowadzenie do hakingu Etyczny haking. Praktyczne wprowadzenie do hakingu
(0,00 zł najniższa cena z 30 dni)53.40 zł
89.00 zł(-40%) -
Ta książka jest kompleksowym i praktycznym przewodnikiem po hakowaniu aplikacji internetowych w ramach udziału w programach bug bounty. Znajdziesz w niej wszystkie niezbędne informacje, od budowania relacji z klientami i pisania znakomitych raportów o błędach w zabezpieczeniach po naukę zaawansow...
Bug Bounty Bootcamp. Przewodnik po tropieniu i zgłaszaniu luk w zabezpieczeniach Bug Bounty Bootcamp. Przewodnik po tropieniu i zgłaszaniu luk w zabezpieczeniach
(0,00 zł najniższa cena z 30 dni)59.40 zł
99.00 zł(-40%) -
Ta książka jest przystępnym wprowadzeniem do kryptografii i bibliotek kryptograficznych Pythona. Omówiono tu podstawowe koncepcje z tej dziedziny, najważniejsze algorytmy i niezbędny zakres podstaw matematycznych: liczby pierwsze, teorię grup czy generatory liczb pseudolosowych. Wyjaśniono, czym ...
Algorytmy kryptograficzne w Pythonie. Wprowadzenie Algorytmy kryptograficzne w Pythonie. Wprowadzenie
(0,00 zł najniższa cena z 30 dni)41.40 zł
69.00 zł(-40%) -
Dzięki tej mądrej, zabawnej książce zdobędziesz wszystkie ważne informacje o funkcjonowaniu internetu. Twoim przewodnikiem będzie Kocimiętka — kotka, która używając jasnego języka i świetnych ilustracji, opowie Ci o sekretach najbardziej skomplikowanej sieci komputerowej świata: o protokoła...
Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu
Article 19 (Author), Mallory Knodel (Contributor), Ulrike Uhlig i in.
(0,00 zł najniższa cena z 30 dni)23.94 zł
39.90 zł(-40%) -
Przekonaj się, jak fascynująca jest kryptografia! Poznaj historię rozwoju kryptografii Opanuj jej matematyczne podstawy Rozpracuj najważniejsze algorytmy kryptograficzne Dowiedz się, jak zastosować je w praktyce Kryptografia to dziedzina nauki, której sedno stanowią sposob...(0,00 zł najniższa cena z 30 dni)
47.40 zł
79.00 zł(-40%) -
Ta książka powstała z myślą o architektach oprogramowania, projektantach, programistach i dyrektorach do spraw technicznych. Zwięźle i przystępnie opisano w niej, jak zadbać o bezpieczeństwo na wczesnym etapie projektowania oprogramowania i jak zaangażować w ten proces cały team. Najpierw zapreze...
Po pierwsze: bezpieczeństwo. Przewodnik dla twórców oprogramowania Po pierwsze: bezpieczeństwo. Przewodnik dla twórców oprogramowania
(0,00 zł najniższa cena z 30 dni)47.40 zł
79.00 zł(-40%) -
Ta książka jest przeznaczona dla osób chcących zrozumieć działanie łańcucha bloków i rozważających praktyczne zastosowanie tej technologii. Skorzystają z niej i menedżerowie, i specjaliści IT. Omówiono tu ewolucję blockchaina i najróżniejsze sposoby jego użycia — przy czym to wyjaśnienie wy...
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
(0,00 zł najniższa cena z 30 dni)41.40 zł
69.00 zł(-40%)
Ebooka przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video zobaczysz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP4 (pliki spakowane w ZIP)
Szczegóły książki
- ISBN Ebooka:
- 978-14-493-6957-6, 9781449369576
- Data wydania ebooka:
-
2005-03-24
Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@helion.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 2.0MB
- Rozmiar pliku Mobi:
- 2.0MB
- Kategorie:
Hacking » Bezpieczeństwo sieci
Hacking » Bezpieczeństwo systemów
Systemy operacyjne » BSD
Hacking » Inne
Spis treści książki
- Mastering FreeBSD and OpenBSD Security
- Preface
- Audience
- Assumptions This Book Makes
- Contents of This Book
- Part I: Security Foundation
- Part II: Deployment Situations
- Part III: Auditing and Incident Response
- Conventions Used in This Book
- Typographic Conventions
- Conventions in Examples
- Using Code Examples
- Comments and Questions
- Safari Enabled
- Acknowledgments
- Yanek Korff
- Paco Hope
- Bruce Potter
- Our Reviewers
- OReilly
- I. Security Foundation
- 1. The Big Picture
- What Is System Security?
- Confidentiality
- Integrity
- Availability
- Summary
- What Is System Security?
- Identifying Risks
- Attacks
- Problems in Software
- Buffer overflows
- SQL injection
- Other software problems
- Protecting yourself
- Denial of Service Attacks
- Target: physical
- Target: network
- Target: application
- Protecting yourself
- 1. The Big Picture
- Improper Configuration and Use
- Sloppy application configuration
- Protecting yourself
- Accounts and permissions
- Passwords and other account problems
- Network Versus Local Attacks
- Physical Security
- Summary
- Responding to Risk
- How Much Security?
- Risk and consequence
- Security versus functionality
- How Much Security?
- Choosing the Right Response
- Mitigate risk
- Accept risk
- Transfer risk
- Security Process and Principles
- Initial Configuration
- Ongoing Maintenance
- Auditing and Incident Response
- System Security Principles
- Apply Security Evenly
- Practice Defense in Depth
- Fail Safe
- Enforce Least Privilege
- Segregate Services
- Simplify
- Use Security Through Obscurity Wisely
- Doubt by Default
- Stay Up to Date
- Wrapping Up
- Resources
- General Security Resources
- General Security-Related Request for Comments (RFCs)
- 2. BSD Security Building Blocks
- Filesystem Protections
- Overview
- UFS Filesystem Flags
- Manipulating flags
- System immutable flag (schg)
- User immutable flag (uchg)
- Nodump flag (nodump)
- System append-only flag (sappnd)
- User append-only flag (uappnd)
- System no unlink flag (sunlnk)
- User no unlink flag (uunlnk)
- Opaque flag (opaque)
- Archived flag (arch)
- Common Uses of Flags
- Candidates for system immutable
- Candidates for append-only
- Finding files with flags
- Filesystem Protections
- POSIX Access Control Lists (FreeBSD Only)
- Enabling ACLs
- ACLs in /etc/fstab
- ACLs in the superblock
- Enabling ACLs
- Managing ACLs
- Tweaking a Running Kernel: sysctl
- Setting sysctl Values
- Kernel Security Level
- Level -1: permanently insecure
- Level 0: transitional security level
- Level 1: improved operational security
- Level 2: high security
- Level 3: network security
- Setting the securelevel for FreeBSD
- Setting the securelevel for OpenBSD
- Thoughts on using securelevel
- Other Security-Related Kernel Variables
- Random PIDs
- Controlling core dumps
- Reducing visibility in the network
- Dropping synfins
- The Basic Sandbox: chroot
- Creating a chroot Environment
- An Example: chrooting ntpd
- Finding Other Dependencies
- Sorting through kdumps output
- Making device nodes
- Limitations of chroot
- Jail: Beyond chroot
- New Limitations
- Limited process interaction
- Limited access to network resources
- Devices and mknod
- New Limitations
- Creating Jail Environments
- Building jails from source
- Installing from a distribution CD
- Launching Jails
- Fat jails as virtual machines
- Jail security options
- Managing jails
- Installing Software in Jail
- Make a builder jail
- Install from binary package
- Getting custom software installed in a jail
- NFS-Based Jails
- Creating a single NFS master jail
- Inherent Protections
- Fighting Buffer Overflows
- W^X memory protection
- ProPolice stack protection
- Fighting Buffer Overflows
- Cryptography
- Code Review
- OS Tuning
- maxusers: Basic Influence
- Increasing Maximum Values
- Network Buffering
- Wrapping Up
- Resources
- 3. Secure Installation and Hardening
- General Concerns
- What Are You Building?
- Workstation
- Workgroup server
- Infrastructure server
- Multipurpose system
- What Are You Building?
- Media and Network
- To be networked or not to be networked
- Media verification
- General Concerns
- Preexisting Vulnerabilities
- Slicing Up Your Filesystem
- XFree86
- Users and Passwords
- Summary
- Installing FreeBSD
- Preparing the Disk
- Choosing Distribution Sets
- Post-Installation Configuration
- Basic network configuration
- Network gateway
- inetd
- sshd
- Security profile (FreeBSD 4.x only)
- Anonymous FTP
- NFS
- Time zone
- Linux compatibility
- XFree86
- Packages
- Finishing up the install
- FreeBSD Hardening: Your First Steps
- Step 1: Configure sudo
- Step 2: Turn Off Unnecessary Services
- Step 3: Update Your System
- Getting the latest sources
- Kernel configuration
- Your first upgrade
- Step 4: Wrapping Up
- Installing OpenBSD
- Preparing the Disk
- Configuring Your Network
- Choosing Your Distribution Sets
- Activating sshd
- An Innocuous Question About X
- Finishing Up
- OpenBSD Hardening: Your First Steps
- Step 1: Create a User
- Step 2: Configure sudo
- Step 3: Turn Off Unnecessary Services
- sshd
- inetd
- Sendmail
- Step 4: Update Your System
- Step 5: Wrapping Up
- Post-Upgrade Hardening
- Configure Users and Groups
- Toor (FreeBSD only)
- Configure Users and Groups
- Adjust Mount Options
- Lock Down sshd
- Password authentication
- Public key authentication
- Challenge response authentication
- Configure Basic Logging
- Create Login Banners
- Configure NTP
- Tune Your Kernel
- Set File Flags
- Local Security
- On the screen
- Adjust /etc/ttys
- Wrapping Up
- Resources
- FreeBSD
- OpenBSD
- 4. Secure Administration Techniques
- Access Control
- Controlling User Access
- Using a catchall primary group
- Project-based or role-based primary groups
- Per-user groups
- Login classes
- umasks
- The danger of ACLs (FreeBSD only)
- Controlling User Access
- Controlling Administrator Access
- Disable and avoid clear-text access
- Connect using SSH
- Privileged access using ssh
- Access Control
- General sudo Configuration
- Avoid dangerous commands
- Use explicit paths
- Be very specific
- Use NOPASSWD sparingly
- Be realistic
- Comparing sudo and su
- Safeguard the Root Password
- Security in Everyday Tasks
- Installing Software
- Ports and packages
- Ports ownership
- Ports and base conflicts
- Multiple versions installed (FreeBSD only)
- Installing Software
- Change Control
- Tracking Changes
- Data Recovery
- Data completeness
- Data confidentiality
- Data retention
- Filesystem access
- Network access
- Upgrading
- Patching Only
- Tracking Branches
- Tracking OpenBSD branches
- Tracking FreeBSD branches
- Security Vulnerability Response
- Keeping Abreast
- Security Advisory Response
- Categorization
- Severity assessment
- Response planning and execution
- Network Service Security
- inetd and tcpwrappers
- Network File System
- Implicit UID and GID trust
- NFS export control
- NFS network restrictions
- Network Information Services
- Password format compatibility
- Encrypted password exposure
- Limiting access to NIS maps
- On the client side
- When is NIS right for you?
- Secure File Distribution Using scp
- Initial setup
- Pushing files with passphrase authentication
- Pushing files without passphrase authentication
- An scp alternative
- Wrapping up
- The Importance of Time (NTP)
- Security
- Architecture
- Monitoring System Health
- Nagios
- Installation
- Configuration
- Installing NRPE
- Configuring Nagios with NRPE
- Fine-tuning
- Wrapping up
- Nagios
- Wrapping Up
- Resources
- Operating System
- System Monitoring
- General Security
- II. Deployment Situations
- 5. Creating a Secure DNS Server
- The Criticality of DNS
- Technical Risks Related to DNS
- Vulnerabilities in DNS software
- Zone misconfigurations
- Missing zone information
- Technical Risks Related to DNS
- Risks Related to DNS and Mail
- Risks Related to DNS Attacks
- Cache poisoning
- DNS spoofing
- Registration hijacking
- The Criticality of DNS
- Responding to DNS-Based Risks
- Limit recursion
- Limit zone transfers
- Maintain your own zones
- Run secure, organization-wide recursion servers
- Separate caches from authoritative servers
- 5. Creating a Secure DNS Server
- Summary
- DNS Software
- BIND 9
- djbdns
- Typical Architecture
- BIND Versus djbdns
- One process or many?
- Zone maintenance
- Dynamic updates
- Incremental zone transfers and notify
- Remote control
- Summary
- Installing BIND
- FreeBSD
- Installing djbdns
- Preliminaries
- Locating zone data
- Daemontools
- ucspi-tcp
- FreeBSD
- Installing on OpenBSD via source
- Installing on OpenBSD via unofficial ports
- Preliminaries
- Operating BIND
- Running BIND in chroot
- Make a filesystem
- Launch BIND from /etc/rc.conf
- Running BIND in chroot
- Configuration Ideas
- Security restrictions
- Logging
- Using includes to separate permissions
- Managing BIND
- Transaction Signatures (TSIG)
- Cautions about using TSIG
- Practical uses for TSIG
- Operating djbdns
- Running tinydns
- Routine Maintenance
- The tinydns data file
- Load balancing
- Naming nameservers
- Wrapping Up
- Resources
- BIND Resources
- djbdns Resources
- Selected DNS-Related Requests for Comments (RFCs)
- 6. Building Secure Mail Servers
- Mail Server Attacks
- Operating System Level Attacks
- Illegitimate Mail Relaying
- Unwanted Mail
- Mail Server Attacks
- Mail Architecture
- Protect the Operating System
- Avoid Being an Open Relay
- Stop Unwanted Mail
- Content filtering with SpamAssassin
- Arbitrary content filtering
- DNS real-time blacklists (RBLs)
- Mail and DNS
- Security Implications
- SMTP
- Envelope Versus Header
- Security Implications
- SMTP AUTH via SASL
- TLS
- SPF
- Message integrity, privacy, and non-repudiation
- Mail Server Configurations
- Null Client
- Internal Mail Server
- Mail Relay
- External Mail Server
- Sendmail
- Installation and Configuration
- Root Background
- The Configuration Files
- Overall Sendmail Security
- File and directory permissions
- Beware recipient programs
- Security-Related Configuration Options
- Arbitrary program restriction
- Dont blame Sendmail
- Masquerade your domain
- Obfuscate greeting
- Permissions of transient files
- Privacy options
- Running sendmail as nonprivileged users
- Safe file environment
- Trusted user
- Trusted users
- Limiting Denial of Service Attacks
- Blocking Unwanted Mail
- Access database
- DNS blacklists
- Milters
- Arbitrary content filtering
- Virus protection
- Authentication and Encryption
- Installing Sendmail+SASL+TLS on FreeBSD
- Installing Sendmail+SASL+TLS on OpenBSD
- Configuring Sendmail with SASL+TLS
- Postfix
- Installation and Configuration: FreeBSD
- Installation and Configuration: OpenBSD
- Postfix Security Foundation
- Do one thing, do it well
- Understanding logging
- Chroot
- Configuration files
- Security-Related Configuration Options
- Arbitrary program restriction
- Masquerade your domain
- Obfuscate smtpd banner
- Disable unneeded commands
- Limiting Denial of Service Attacks
- Blocking Unwanted Mail
- Access table
- Arbitrary content filtering
- DNS blacklists
- Virus protection
- Authentication and Encryption
- Verifying Postfix+SASL+TLS installation
- Configuring Postfix with SASL+TLS
- qmail
- Mail Access
- Guidelines for Securing Mail AccessInternally
- Guidelines for Securing Mail AccessExternally
- Virtual private networks (VPN)
- Webmail
- Wrapping Up
- Resources
- MTA Software
- Spam Defense and Antivirus
- SMTP Security
- Mail Access Software
- Selected Mail-Related Request for Comments (RFCs)
- 7. Building a Secure Web Server
- Web Server Attacks
- Why You Care
- Specific Threats to Web Servers
- File and data disclosure
- Arbitrary program execution
- Application abuse
- Web Server Attacks
- Web Architecture
- Server Software Choices
- Apache
- Installing Apache
- FreeBSD
- Makefile options
- Recording your use of Apache 2
- FreeBSD
- OpenBSD
- Configure parameters
- Installing Apache
- Configuring Apache
- User overrides
- Protecting critical files
- Resisting denial of service
- Module Overview
- mod_cgi
- mod_php
- PHP and permissions
- mod_php Apache configuration
- PHP configuration
- mod_perl
- mod_include
- mod_dav
- mod_autoindex
- mod_info and mod_status
- mod_userdir
- Apache Best Practices
- Enable only modules you need
- Minimize information leaks
- Always separate HTML and CGI locations
- Protect sensitive configuration files
- Run CGI programs as normal users
- cgiwrap
- mod_suexec
- Summary
- Encrypting Web Traffic
- SSL and certificates
- Enabling SSL
- SSL, TLS, and cipher choice
- Restricting ciphers at the server
- CPU usage
- thttpd
- Installing thttpd
- Configuring thttpd
- Resisting Denial of Service
- Advanced Web Servers with Jails
- Using Jail or Chroot
- How many instances?
- Building and installing into a jail
- Finding and adding support files
- Launching httpd in chroot(8) on OpenBSD or FreeBSD
- Launching httpd in jail(8) on FreeBSD
- Using Jail or Chroot
- A Two-Tiered Architecture
- Configure the internal jails
- Configuring the external jail
- Jail versus chroot
- Advantages and Disadvantages
- Ultimate separation
- Performance
- Modularity
- Wrapping Up
- Resources
- Apache Resources
- thttpd Resources
- General Resources
- Selected Web-Related RFCs
- 8. Firewalls
- Firewall Architectures
- Bump in the Wire
- DMZ
- Spider
- Transparent
- Host
- High Availability
- Firewall Architectures
- Host Lockdown
- The Options: IPFW Versus PF
- IPFW
- PF
- Differences
- Basic IPFW Configuration
- Kernel Configuration
- Startup Configuration
- Firewall Configuration
- Optional arguments
- Required arguments
- Using the Firewall
- Basic PF Configuration
- Kernel and Startup Configuration
- PF in FreeBSD
- Firewall Configuration
- Using the Firewall
- Logging
- Handling Failure
- CARP
- CARP Configuration
- pfsync
- Wrapping Up
- Resources
- 9. Intrusion Detection
- No Magic Bullets
- Monitoring an IDS
- Responding to IDS Events
- No Magic Bullets
- IDS Architectures
- Host-Based IDS
- Network-Based IDS
- Log Analysis Versus IDS
- Honeypots Versus IDS
- Intrusion Prevention Systems
- NIDS on BSD
- Snort
- Sensor Hardware
- Host Lockdown
- Installing and Configuring Snort
- Containing Snort
- Storing Events in Flat Files
- Storing Events in MySQL
- Snort with PF
- ACID
- Installing ACID
- Configuring ACID
- Running ACID
- HIDS on BSD
- Osiris
- Installing and Configuring Osiris
- Running Osiris
- Wrapping Up
- Resources
- III. Auditing and Incident Response
- 10. Managing the Audit Trails
- System Logging
- Logging via syslogd
- syslog.conf Configuration
- Syslog Facilities
- Syslog Levels
- Program and Hostname Matching
- Syslog Actions
- Debugging syslogd
- Running syslogd
- Additional sockets
- syslogd on FreeBSD
- syslogd on OpenBSD
- syslogd Drawbacks
- Lack of access control
- Lack of reliability
- Lack of integrity or confidentiality
- Monolithic
- 10. Managing the Audit Trails
- syslogd Replacements
- syslog-ng
- minirsyslogd
- msyslog
- Capturing Logs
- Securing a Loghost
- Benefits of a Loghost
- Loghost System Security
- Syslog Relay
- Syslog relay configuration
- Conclusion
- logfile Management
- newsyslog Overview
- Configuring Log Rotation
- Securing logfiles
- Automated Log Monitoring
- Automated Auditing Using logcheck
- Installation
- Configuration
- Drawbacks
- Automated Auditing Using logcheck
- Automated Auditing Using swatch
- Installation
- Configuration
- Running swatch
- Catching new messages
- Ongoing Monitoring
- Automated Auditing Scripts
- OpenBSDs Security Script
- FreeBSDs Periodic Scripts
- Wrapping Up
- Resources
- Logging Tools
- Secure Transport Providers for Logging
- Log Monitoring
- Selected Logging-Related Request for Comments (RFCs)
- 11. Incident Response and Forensics
- Incident Response
- Preparation
- Identifying resources
- Training staff
- Creation of document templates
- Building your bag of tricks
- Preparation
- Incident Detection
- Incident Assessment
- Response
- Postmortem Analysis
- Incident Response
- Forensics on BSD
- How Serious Are You?
- Online and Offline Analysis
- Things to Look For
- Changed files
- Added users
- Strange directories
- Unknown processes and LKMs
- Known rootkits and hacker tools
- Digging Deeper with the Sleuth Kit
- History of the Sleuth Kit
- Installing and Understanding TSK
- Using TSK
- Autopsy
- Wrapping Up
- Resources
- Index
- About the Authors
- Colophon
- Copyright
O'Reilly Media - inne książki
-
FinOps brings financial accountability to the variable spend model of cloud. Used by the majority of global enterprises, this management practice has grown from a fringe activity to the de facto discipline managing cloud spend. In this book, authors J.R. Storment and Mike Fuller outline the proce...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
Edge AI is transforming the way computers interact with the real world, allowing IoT devices to make decisions using the 99% of sensor data that was previously discarded due to cost, bandwidth, or power limitations. With techniques like embedded machine learning, developers can capture human intu...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all ...(0,00 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Python was recently ranked as today's most popular programming language on the TIOBE index, thanks to its broad applicability to design and prototyping to testing, deployment, and maintenance. With this updated fourth edition, you'll learn how to get the most out of Python, whether you're a profe...(0,00 zł najniższa cena z 30 dni)
305.15 zł
359.00 zł(-15%) -
With the accelerating speed of business and the increasing dependence on technology, companies today are significantly changing the way they build in-house business solutions. Many now use low-code and no code technologies to help them deal with specific issues, but that's just the beginning. Wit...
Building Solutions with the Microsoft Power Platform Building Solutions with the Microsoft Power Platform
(0,00 zł najniższa cena z 30 dni)271.15 zł
319.00 zł(-15%) -
Companies are scrambling to integrate AI into their systems and operations. But to build truly successful solutions, you need a firm grasp of the underlying mathematics. This accessible guide walks you through the math necessary to thrive in the AI field such as focusing on real-world application...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code.In this book, authors BK Sarthak Das and Virginia Chu d...(0,00 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
With the increasing use of AI in high-stakes domains such as medicine, law, and defense, organizations spend a lot of time and money to make ML models trustworthy. Many books on the subject offer deep dives into theories and concepts. This guide provides a practical starting point to help develop...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
Why are so many companies adopting GitOps for their DevOps and cloud native strategy? This reliable framework is quickly becoming the standard method for deploying apps to Kubernetes. With this practical, developer-oriented book, DevOps engineers, developers, IT architects, and SREs will learn th...(0,00 zł najniższa cena z 30 dni)
271.15 zł
319.00 zł(-15%) -
Learn the essentials of working with Flutter and Dart to build full stack applications that meet the needs of a cloud-driven world. Together, the Flutter open source UI software development kit and the Dart programming language for client development provide a unified solution to building applica...(0,00 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
W przypadku usługi "Druk na żądanie" termin dostarczenia przesyłki może obejmować także czas potrzebny na dodruk (do 10 dni roboczych)
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.


Oceny i opinie klientów: Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems Yanek Korff, Paco Hope, Bruce Potter (0)
Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.