Table of Contents:
  • Includes bibliographical references and index
  • System snapshots with Tripwire
  • Firewalls with iptables and ipchains
  • Network access control
  • Authentication techniques and infrastructures
  • Authorization controls
  • Protecting outgoing network connections
  • Protecting files
  • Protecting email
  • Testing and monitoring