Suse Linux Enterprise Server Security Administrator's Handbook
- List Price: $49.99
- Binding: Paperback
- Publisher: Macmillan Computer Pub
- Publish date: 03/16/2005
Description:
I.SUSE SERVER INSTALLATION AND CONFIGURATION. 1. Installing SUSE LINUX EnterpriseServer. Installation Methods and Overview. CD-ROMBased Installation. VNC-Based Installation. Network-Based Installation. AutoYaST-Based Installation. Pre-Installation Planning. Ten Easy Steps to SLES 9 Installation. Selecting an Installation Method. Selecting the Language. Choosing Installation Settings. Preparing the Hard Disks. Configuring the System. Specifying Network Settings. Applying Online Updates. Configuring Services. Configuring User Information. Configuring Hardware. Troubleshooting. Summary. 2. Updating the Server. Maintaining Your System Configuration. SuSEconfig. YaST (Yet another Setup Tool). Adding and Removing Packages. Installing a Package. Removing a Package or Subcomponents. Adding and Removing Hardware. Preparations. Adding a Disk. Changing Network Configuration. Network Parameters. Using YaST to Manage the Network Configuration. Summary. 3. Booting and Shutting Down the Server. Boot Loaders. LILO. Grub. Kernel Boot. init and Understanding Runlevels. System Shutdown. Emergency Boot and Recovery. Summary. II. USER ACCESS AND SECURITY MANAGEMENT. 4. User and Group Administration. User and Group IDs. User and Group Data Files. The /etc/passwd File. The /etc/shadow File. The /etc/group File. User Account and Group Management Applications. Creating and Editing User Accounts. Setting Default User Account Properties. Creating and Editing Groups. Security Considerations. Using Strong Passwords. Auditing Default Accounts. The Root Account. User in Too Many Groups? Summary. 5. User Environment Management and Security. Account Auditing. Configuring the User Environment. Default Shell. Login Scripts and Environment Variables. User Resource Management. Authentication Using PAM. PAM Module Configuration. Resource Management. Access Time Management. Quota Management. su or sudo. Summary. 6. Filesystem Security. A Review of File and Directory Permissions. Changing Permissions. Changing User and Group Ownership. Security Considerations. Default Access Permissions. Special File Permissions. Security Implications of SUID/SGID. SGID and File Sharing. A SUID Sample Program. Securing Against SUID Programs. Sticky Business. Extended Attributes. Data and Filesystem Encryption. Secure File Deletion. Journaled Filesystems. Summary. 7. System Management and Monitoring. Common Linux Commands. Basic Commands. Additional Tools. The root Filesystem. Health Checks and System Monitoring. Machine Uptime. Log Review. Top Consumers. Application Check. System Resource Check. User Login Activity. System Tuning. Tuning Kernel Parameters. Tuning Filesystem Access. Summary. III. INSTALLING AND CONFIGURING NETWORKING SERVICES. 8. Network Services. Angels and Daemons. Configuring xinetd. The /etc/xinetd.conf File. Applying Access Control. Security Considerations. Network Time Services. Configuring the NTP Client. Configuring an NTP Server. Troubleshooting Tips. Email Services. File Transfer Services. Using Pure-FTPd. Using vsftpd. Using the
Expand description
Product notice
Returnable at the third party seller's discretion and may come without consumable supplements like access codes, CD's, or workbooks.
Seller | Condition | Comments | Price |
|
LeifBooks
Acceptable
|
$4.51
|
|
Wonder Book - Member ABAA/ILAB
Very Good |
$6.42
|
Ergodebooks
|
Good |
$16.54
|
Please Wait