UNIX BooksUnix Security Books

Linux Security HOWTO (K. Fenzi, D. Wreski)

Advertisement

Linux Security HOWTO (K. Fenzi, D. Wreski)

Linux Security HOWTO (K. Fenzi, D. Wreski)

Currently this section contains no detailed description for the page, will update this page soon.

Author(s):

s Pages
Similar Books
Practical Linux or Unix Security

Practical Linux or Unix Security

This PDF covers the following topics related to Linux/UNIX Security : Core security concepts, Maintaining confidentiality, Keeping our data safe from intruders, Integrity, Authentication, Security from the start, inetd vs. iptfw, Firewalling, Controlling your users, Cracklib, etc.

s71 Pages
Secure Programming for Linux and Unix HOWTO (PDF 168P)

Secure Programming for Linux and Unix HOWTO (PDF 168P)

This note covers the following topics: background, history of unix, linux, and open source, security principles, why do programmers write insecure code?, is open source good for security?, types of secure programs, paranoia is a virtue, why did i write this document?, sources of design and implementation guidelines, other sources of security information, document conventions, summary of linux and unix security features, processes, files, system v ipc, sockets and network connections, signals, quotas and limits, dynamically linked libraries, audit, pam, specialized security extensions for unix-like systems, security requirements, common criteria introduction, security environment and objectives,validate all input, command line, environment variables, file descriptors, file names, file contents, web-based application inputs (especially cgi scripts), other inputs, human language (locale) selection, character encoding, prevent cross-site malicious content on input, filter html/uris that may be re-presented, remove or forbid some html data, encoding html data, validating html data, validating hypertext links (uris/urls), other html tags, related issues, forbid http get to perform non-queries, counter spam, limit valid input time and load level, avoid buffer overflow, dangers in c/c++, library solutions in c/c++, standard c library solution, static and dynamically allocated buffers, strlcpy and strlcat, libmib, c++ std

s168 Pages
Practical UNIX  Internet Security (S. Garfinkel, G. Spafford)

Practical UNIX Internet Security (S. Garfinkel, G. Spafford)

Currently this section contains no detailed description for the page, will update this page soon.

s Pages
Practical UNIX Internet Security (S. Garfinkel, G. Spafford) Mirror

Practical UNIX Internet Security (S. Garfinkel, G. Spafford) Mirror

Currently this section contains no detailed description for the page, will update this page soon.

s Pages
Linux Firewall Configuration Packet Filtering and Netfilter/iptables (O. Andreasson)

Linux Firewall Configuration Packet Filtering and Netfilter/iptables (O. Andreasson)

Currently this section contains no detailed description for the page, will update this page soon.

s Pages
Secure Programming for Linux and Unix (D.A. Wheeler)

Secure Programming for Linux and Unix (D.A. Wheeler)

Currently this section contains no detailed description for the page, will update this page soon.

s Pages

Advertisement