Résumé
Reviewed and approved by the experts at Red Hat, this in-depth guide delivers all the know-how you need to set up and manage a state-of-the-art Linux Internet server in a small or medium-sized business or organization.
Red Hat Linux experts Paul Sery and Jay Beale start with the basics - networking fundamentals, Internet connections, firewalls. They then show you in detail how to establish Web and Internet services, from setting up database connectivity, secure connections, and streaming media to configuring domain name, e-mail, file transfer, and resource-sharing servers. Last but not least, they provide a focused discussion of server management issues and deliver five thorough chapters with the latest advice on keeping your network secure.
This authorized Red Hat Linux guide is the one resource you need for a secure, high-performance Linux Internet server.
Proven Red Hat Linux Internet Server Solutions- Configure either one of two example network typologies
- Connect to the Internet via cable or DSL
- Establish a stateful IP filtering firewall
- Set up Apache 2 Web server and a streaming audio server
- Connect a SQL database to the Web server and provide Secure Socket Layer Web connections
- Create DNS, SMTP, FTP, and Samba servers
- Automate network backups and increase system reliability
- Increase security with lock down, intrusion detection, and more
Contents
Part 1 Building a Linux Network- Introducing the Example Networks
- Configuring Red Hat Linux Networking
- Connecting to the Internet via DSL
- Building a Firewall
- Introducing Basic Troubleshooting
- Configuring a Basic Apache Server
- Connecting a Database to the Web Server
- Building a Simple Audio Streaming Server
- Building a Domain Name Server
- Creating an SMTP E-mail Server
- Configuring FTP
- Configuring Samba
- Automating Network Backups
- Increasing the Reliability of a Linux Server
- Introducing Basic Server Security
- Introducing Secure System Administration
- Hardening the System
- Introducing Simple Intrusion Detection Systems
- Log Monitoring and Incident Response
Appendix B: Configuring a Dial-up Internet Connection
Appendix C: Automating Your Server Configuration
Appendix D: Using DHCP
L'auteur - Paul G. Sery
works for Sandia National Laboratories in Albuquerque,
New Mexico. He is a member of the Computer Service Unit,
Special Projects, which specializes in managing and
troubleshooting UNIX and Linux systems. Paul is the author
of LINUX Network Toolkit, IDG Books Worldwide, 1998,
and has a bachelors degree in Electrical Engineering from
the University of New Mexico. When he is not beating his
head against systems administration problems, Paul and his
wife Lidia enjoy riding their tandem through the bosque in
the Rio Grande valley. They also enjoy traveling throughout
Mexico.
L'auteur - Jay Beale
Jay Beale is the founder and president of JJB Security Consulting as well as the lead developer for Bastille Linux, a security product used to harden Linux and HP-UX. A frequent speaker at security conferences, he is the author of Locking Down Linux the Bastille Way.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Redhat Press |
Auteur(s) | Paul G. Sery, Jay Beale |
Parution | 05/12/2002 |
Nb. de pages | 572 |
Format | 18,8 x 23,4 |
Couverture | Broché |
Poids | 852g |
Intérieur | Noir et Blanc |
EAN13 | 9780764547881 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse