- Table of Contents
- Preface
- I. Computer Security Basics
- 1. Introduction
- 2. Policies and Guidelines
- II. User Responsibilities
- 3. Users and Passwords
- 4. Users, Groups, and the Superuser
- 5. The UNIX Filesystem
- 6. Cryptography
- III. System Security
- 7. Backups
- 8. Defending Your Accounts
- 9. Integrity Management
- 10. Auditing and Logging
- 11. Protecting Against Programmed Threats
- 12. Physical Security
- 13. Personnel Security
- IV. Network and Internet Security
- 14. Telephone Security
- 15. UUCP
- 16. TCP/IP Networks
- 17. TCP/IP Services
- 18. WWW Security
- 19. RPC, NIS, NIS+, and Kerberos
- 20. NFS
- V. Advanced Topics
- 21. Firewalls
- 22. Wrappers and Proxies
- 23. Writing Secure SUID and Network Programs
- VI. Handling Security Incidents
- 24. Discovering a Break-in
- 25. Denial of Service Attacks and Solutions
- 26. Computer Security and U.S. Law
- 27. Who Do You Trust?
- VII. Appendixes
- App. A: UNIX Security Checklist
- App. B: Important Files
- App. C: UNIX Processes
- App. D: Paper Sources
- App. E: Electronic Resources
- App. F: Organizations
- App. G: Table of IP Services
- Index