免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 3043 | 回复: 3
打印 上一主题 下一主题

No.Starch出品:Linux Firewall(2007.09) [复制链接]

论坛徽章:
2
2015年辞旧岁徽章
日期:2015-03-03 16:54:152015年迎新春徽章
日期:2015-03-04 09:55:28
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2008-03-10 11:49 |只看该作者 |倒序浏览

                                                        
Linux Firewalls

Attack Detection and Response with iptables, psad, and fwsnort
by Michael Rash
October 2007, 336 pp.
ISBN-10 1-59327-141-7
ISBN-13 978-1-59327-141-1

$49.95 Paperback
$29.95 PDF
$59.95 PDF and Paperback

"Between 2000 and mid-2008, I've read and reviewed nearly 250technical books. I've also written several books, so I believe I canrecognize a great book when I see it. Linux Firewalls is a great book."
Richard Bejtlich, TaoSecurity.com, from the foreword to Linux Firewalls
View a sample chapter, Chapter 10: Deploying fwsnort
System administrators need to stay ahead of new securityvulnerabilities that leave their networks exposed every day. A firewalland an intrusion detection systems (IDS) are two important weapons inthat fight, enabling you to proactively deny access and monitor networktraffic for signs of an attack.
Linux Firewalls discusses the technical details of theiptables firewall and the Netfilter framework that are built into theLinux kernel, and it explains how they provide strong filtering,Network Address Translation (NAT), state tracking, and applicationlayer inspection capabilities that rival many commercial tools. You'lllearn how to deploy iptables as an IDS with psad and fwsnort and how tobuild a strong, passive authentication layer around iptables withfwknop.
Concrete examples illustrate concepts such as firewall log analysisand policies, passive network authentication and authorization, exploitpacket traces, Snort ruleset emulation, and more with coverage of thesetopics:
  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs
Perl and C code snippets offer practical examples that will help youto maximize your deployment of Linux firewalls. If you're responsiblefor keeping a network secure, you'll find Linux Firewallsinvaluable in your attempt to understand attacks and use iptables—alongwith psad and fwsnort—to detect and even prevent compromises.
Visit the book's companion site for supporting files, downloads, errata, and more.
Michael Rash is a Security Architect on the Dragon Intrusion DetectionSystem with Enterasys Networks, Inc., and is a frequent contributor toopen source projects. As the creator of psad, fwknop, and fwsnort, Rashis an expert on firewalls, IDSs, OS fingerprinting, and the Snort ruleslanguage. He is co-author of the book Snort 2.1 Intrusion Detection,lead-author and technical editor of the book Intrusion Prevention andActive Response, and has written security articles for Linux Journal,SysAdmin, and ;login:.

[ 本帖最后由 Send_linux 于 2008-3-10 11:54 编辑 ]

No.Starch.Press.Linux.Firewalls.Sep.2007.1593271417.part1.rar

1.39 MB, 下载次数: 181

No.Starch.Press.Linux.Firewalls.Sep.2007.1593271417.part2.rar

1.39 MB, 下载次数: 262

No.Starch.Press.Linux.Firewalls.Sep.2007.1593271417.part3.rar

1.39 MB, 下载次数: 163

No.Starch.Press.Linux.Firewalls.Sep.2007.1593271417.part4.rar

879.75 KB, 下载次数: 176

论坛徽章:
49
15-16赛季CBA联赛之福建
日期:2016-06-22 16:22:002015年亚洲杯之中国
日期:2015-01-23 16:25:12丑牛
日期:2015-01-20 09:39:23未羊
日期:2015-01-14 23:55:57巳蛇
日期:2015-01-06 18:21:36双鱼座
日期:2015-01-02 22:04:33午马
日期:2014-11-25 09:58:35辰龙
日期:2014-11-18 10:40:07寅虎
日期:2014-11-13 22:47:15申猴
日期:2014-10-22 15:29:50摩羯座
日期:2014-08-27 10:49:43辰龙
日期:2014-08-21 10:47:58
2 [报告]
发表于 2008-03-10 11:55 |只看该作者
原帖由 Send_linux 于 2008-3-10 11:49 发表

                                                        
Linux Firewalls
Attack Detection and Response with iptables, psad, and fwsnort
by Michael ...

非常不错的一本书,嘿嘿,我在别的论坛看见的,就转过来了

论坛徽章:
0
3 [报告]
发表于 2008-04-17 11:18 |只看该作者
只要是好帖不怕转的,是吧楼主?
southman 该用户已被删除
4 [报告]
发表于 2008-07-11 23:34 |只看该作者
提示: 作者被禁止或删除 内容自动屏蔽
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP