feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (3)
  • FU Berlin  (3)
  • 2005-2009  (3)
  • 1
    Book
    Book
    Baden-Baden :Nomos-Verl.-Ges.,
    UID:
    almafu_BV022306725
    Format: 226 S.
    Edition: 1. Aufl.
    Series Statement: Verwaltungsressourcen und Verwaltungsstrukturen 6
    Language: English
    Subjects: Political Science
    RVK:
    RVK:
    RVK:
    Keywords: Internationale Organisation ; Verwaltungsreform ; Konferenzschrift ; Fallstudie ; Konferenzschrift
    Author information: Bauer, Michael W. 1969-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Sebastopol, California :O'Reilly,
    UID:
    edocfu_9961551057602883
    Format: 1 online resource (544 p.)
    Edition: 2nd ed.
    ISBN: 0-596-51799-8
    Content: Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most co
    Note: "Tools & best practices for bastion hosts"--Cover. , Earlier edition under title: Building secure servers with Linux. , Table of Contents; Preface; What This Book Is About; The Paranoid Penguin Connection; The Second Edition; Audience; What This Book Doesn't Cover; Assumptions This Book Makes; Organization of This Book; Conventions Used in This Book; Safari® Enabled; How to Contact Us; Using Code Examples; Acknowledgments; Threat Modeling and Risk Management; Components of Risk; Assets; Security Goals; Data confidentiality; Data integrity; System integrity; System/network availability; Threats; Motives; Financial motives; Political motives; Personal/psychological motives , Vulnerabilities and Attacks Against ThemSimple Risk Analysis: ALEs; An Alternative: Attack Trees; Defenses; Asset Devaluation; Vulnerability Mitigation; Attack Mitigation; Conclusion; Resources; Designing Perimeter Networks; Some Terminology; Types of Firewall and DMZ Architectures; The "Inside Versus Outside" Architecture; The "Three-Homed Firewall" DMZ Architecture; A Weak Screened-Subnet Architecture; A Strong Screened-Subnet Architecture; Deciding What Should Reside on the DMZ; Allocating Resources in the DMZ; The Firewall; Types of Firewall; Simple packet filters , Stateful packet filteringStateful Inspection; Application-layer proxies; Selecting a Firewall; General Firewall Configuration Guidelines; Harden your firewall's OS; Configure anti-IP-spoofing rules; Deny by default; Strictly limit incoming traffic; Strictly limit all traffic out of the DMZ; Don't give internal systems unrestricted outbound access; If you have the means, use an application-gateway firewall; Don't be complacent about host security; Hardening Linux and Using iptables; OS Hardening Principles; Installing/Running Only Necessary Software; Commonly unnecessary packages , Disabling services in Red Hat and related distributionsDisabling services in SUSE; Disabling services in Debian 3.0; Disabling services in other Linux distributions; Keeping Software Up to Date; Distribution (global) updates versus per-package updates; Whither X-based updates?; How to be notified of and obtain security updates: Red Hat; RPM updates for the extremely cautious; Yum: a free alternative to up2date; How to be notified of and obtain security updates: SUSE; SUSE's online-update feature; How to be notified of and obtain security updates: Debian , Deleting Unnecessary User Accounts and Restricting Shell AccessRestricting Access to Known Users; Running Services in chrooted Filesystems; Minimizing Use of SUID root; Identifying and dealing with SUID root files; Using su and sudo; Using su; Using sudo; Configuring, Managing, and Monitoring Logs; Every System Can Be Its Own Firewall: Using iptables for Local Security; Using iptables: Preparatory steps; How netfilter works; Using iptables; Checking Your Work with Scanners; Types of scans and their uses; Why we (good guys) scan; nmap, world champion port scanner; Getting and installing nmap , Using nmap , Available also in a print edition. , English
    Additional Edition: ISBN 0-596-00670-5
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_BV026684630
    Format: S. 625 - 794.
    Series Statement: Journal of European public policy 15,5
    In: Journal of European public policy, yr:2008
    Language: English
    Keywords: Reform ; Aufsatzsammlung
    Author information: Bauer, Michael W. 1969-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages