Skip to Content
Linux Firewalls, Third Edition
book

Linux Firewalls, Third Edition

by Steve Suehring, Robert Ziegler
September 2005
Intermediate to advanced
552 pages
13h 30m
English
Sams
Content preview from Linux Firewalls, Third Edition

Summary

This chapter focused on monitoring system integrity and intrusion detection. If you suspect that a system might be compromised, you can refer to this chapter's list of potential problem indications. If you see some of these indications and conclude that the system is compromised, you can make use of the list of recovery steps discussed. Finally, incident-reporting considerations were discussed, and pointers were given on whom you might report an incident to.

Chapter 10 looks at the implementation of some of the things you learned in this chapter by looking at the specific tools involved in intrusion detection and system testing.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Linux Firewalls

Linux Firewalls

Michael Rash

Publisher Resources

ISBN: 0672327716Purchase book