- Table of Contents
    
   
  - Preface
 
  - I. Computer Security Basics
 
  
    - 1. Introduction
 
    - 2. Policies and Guidelines
 
  
  - II. User Responsibilities
 
  
    - 3. Users and Passwords
 
    - 4. Users, Groups, and the Superuser
 
    - 5. The UNIX Filesystem
 
    - 6. Cryptography
 
  
  - III. System Security
 
  
    - 7. Backups
 
    - 8. Defending Your Accounts
 
    - 9. Integrity Management
 
    - 10. Auditing and Logging
 
    - 11. Protecting Against Programmed Threats
 
    - 12. Physical Security
 
    - 13. Personnel Security
 
  
  - IV. Network and Internet Security
 
  
    - 14. Telephone Security
 
    - 15. UUCP
 
    - 16. TCP/IP Networks
 
    - 17. TCP/IP Services
 
    - 18. WWW Security
 
    - 19. RPC, NIS, NIS+, and Kerberos
 
    - 20. NFS
 
  
  - V. Advanced Topics
 
  
    - 21. Firewalls
 
    - 22. Wrappers and Proxies
 
    - 23. Writing Secure SUID and Network Programs
 
  
  - VI. Handling Security Incidents
 
  
    - 24. Discovering a Break-in
 
    - 25. Denial of Service Attacks and Solutions
 
    - 26. Computer Security and U.S. Law
 
    - 27. Who Do You Trust?
 
  
  - VII. Appendixes
 
  - App. A: UNIX Security Checklist
 
  - App. B: Important Files
 
  - App. C: UNIX Processes
 
  - App. D: Paper Sources
 
  - App. E: Electronic Resources
 
  - App. F: Organizations
 
  - App. G: Table of IP Services
 
  - Index