The Complete IS-IS Routing Protocol
Author: Hannes Gredler
The IS-IS routing protocol has gone through a high-speed evolution in recent years. Initially deployed by the largest ISPs in a desperate search for a stable link-state protocol, it quickly gained popularity for its advantages in link-state routing. Today, it is a widely deployed protocol even at smaller ISPs but because of its meteoric adoption it has been sparsely documented. As service providers add multivendor platforms from both Cisco and Juniper Networks, it is difficult to get a complete picture of the IS-IS that is deployed in the field. As service providers deploy increasingly multivendor implementations of IS-IS, they desperately need to know how to interoperate the protocol on different routing platforms. Only a book such as The Complete IS-IS Routing Protocol can provide the insight and practical solutions necessary, because it takes a multivendor, real-world competitive approach to implementing IS-IS. The Complete IS-IS Routing Protocol will be the seminal book on IS-IS for many years to come.
See also: Its Okay to Be the Boss or Call Me Ted
Practical UNIX and Internet Security
Author: Simson Garfinkel
When Practical UNIX Security was first published in 1991, it became an instant classic. Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.
This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. In it you'll find coverage of features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.
If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.
Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.
- Part I: Computer Security Basics. Introduction and security policies.
- Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography.
- Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security.
- Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS.
- Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming.
- Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust.
- VII: Appendices. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.
Table of Contents:Preface to the Second Edition
2. Policies & Guidelines
3. Users and Passwords
4. Users, Groups, and the Superuser
5. The UNIX Filesystem
8. Defending Your Accounts
9. Integrity Management
10. Auditing and Logging
11. Protecting Against Programmed Threats
12. Physical Security
13. Personnel Security
15. UUCP 438
16. TCP/IP Networks
17. UNIX TCP/IP Services
18. WWW Security
19. RPC and Configuration Management
22. Wrappers & Proxies
23. Writing Secure SUID and Network Programs
24. Discovering a Break-in
25. Denial of Service Attacks and Solutions
26. Computer Security and U.S. Law
27. Who Do You Trust?
A. UNIX Security Checklist
B. Important Files
C. UNIX Processes
D. Paper Sources
E. Electronic Resources
F. Other Sources