
This is the Title of the Book, eMatter Edition
Copyright © 2007 O’Reilly & Associates, Inc. All rights reserved.
xiv
|
Preface
Chapter 10, Securing Web Servers, is an in-depth approach to the many risks and
solutions involved in running Apache, Perl and PHP CGI scripts, and other dynamic
features of web sites.
Chapter 11, Securing File Services, explains how to configure the ProFTPD and
vsftpd FTP servers and how to use rsync.
Chapter 12, System Log Management and Monitoring, covers the use of syslog and
Syslog-ng for logging and Swatch for automated logfile monitoring.
Chapter 13, Simple Intrusion Detection Techniques, introduces the complex field of
intrusion detection and offers in-depth coverage of Tripwire and Snort.
The Appendix, Two Complete iptables Startup Scripts, provides models for creating
firewalls.
Conventions Used in This Book
This book uses the following typographical conventions:
Italic
Indicates Unix pathnames, filenames, commands, and packages and program
names; Internet addresses, such as domain names and URLs; account user-
names; and new terms where they are defined.
Constant Width
Indicates command lines and options that should be typed verbatim, as well as
names and keywords in system scripts, including commands, parameter names,
and variable names.
Constant Width Bold
Used in examples and tables to show commands or other text that should be
typed literally by the user.
Constant Width ...