By Kurt Seifried kurt@seifried.org, Copyright Kurt Seifried 2001. License is here. Chapters with listed sections are "completed", the rest is still being rewritten.
I will be speaking at CSICON, August 19-21, Calgary, Alberta, Canada
Latest major update: Introduction to computer security
About this book
Acknowledgements
Contacts and mailing lists
Typographical conventions
Errata and bugs
What is computer security?
Security Policy
Acceptable Use Policy
Privacy Policy
Security as a process
Defense in depth
Technical problems
section sponsored by VIGILANTe
Verifying packages and files
Installation media
Automating installs
Filesystem layout and structuring
Hardening your installation
Summary
Physical security
Console security
Summary
Overview
Local tools
WWW based tools
Other network based tools
Non-commercial backup programs for Linux
Commercial backup programs for Linux
Backup media
Basic file commands
Secure file deletion
Access control lists (ACL’s)
Critical system configuration files
File encryption
Filesystem encryption
Hiding data
PAM
Authentication services
Passwords
Cracking passwords
Password storage
Baselines
File system monitoring
Network monitoring / attack detection
Intrusion Detection Papers
Dealing with attacks
Packet sniffers
Packet sniffer detection
Host scanners
Network scanners
Application level Scanners
Exploits
Firewalling concepts
Firewalling
with IPTables (Linux Kernel 2.4 and 2.5)
Firewalling with IPChains (Linux Kernel 2.2, 2.3, 2.4 and 2.5)
Firewalling with IPFWADM (Linux Kernel 2.0)
Limiting users
Monitoring users
Last updated on 1/10/2001
Copyright Kurt Seifried 2001 kurt@seifried.org