Part I: SUSE Server Installation and Configuration
CHAPTER 1: Installing SUSE LINUX Enterprise Server
Installation Methods and Overview
Ten Easy Steps to SLES 9 Installation
Selecting an Installation Method
Choosing Installation Settings
CHAPTER 2: Updating the Server
Maintaining Your System Configuration
Removing a Package or Subcomponents
Changing Network Configuration
Using YaST to Manage the Network Configuration
CHAPTER 3: Booting and Shutting Down the Server
init and Understanding Runlevels
Part II: User Access and Security Management
CHAPTER 4: User and Group Administration
User Account and Group Management Applications
Creating and Editing User Accounts
Setting Default User Account Properties
CHAPTER 5: User Environment Management and Security
Configuring the User Environment
Login Scripts and Environment Variables
CHAPTER 6: Filesystem Security
A Review of File and Directory Permissions
Changing User and Group Ownership
Security Implications of SUID/SGID
Securing Against SUID Programs
Data and Filesystem Encryption
CHAPTER 7: System Management and Monitoring
Health Checks and System Monitoring
Part III: Data Backup and Disaster Recovery
Using the Standard TFTP Server
Securing System Management Conversations
Restricting Connections by IP Address
A Secure System Management Environment
Service Location Protocol (SLP)
Dynamic Host Configuration Protocol (DHCP)
Network Information Services (NIS)
Lightweight Directory Access Protocol (LDAP)
Command-Line Queue Configuration
CHAPTER 10: Data Backup and Disaster Recovery
Implementing a Backup Strategy
Grandfather-Father-Son Rotation Method
Tower of Hanoi Rotation Method
Database Backups: Cold or Hot?
Converting and Copying Data Using dd
YaST’s System Backup and Restore Modules
Part IV: Securing Your SUSE Server
CHAPTER 11: Network Security Concepts
CHAPTER 12: Intrusion Detection
Detecting a Network-based Intrusion
Know Your Traffic, Tune Your Firewall
Network Intrusion Detection Systems
Analysis Console for Intrusion Databases
Advanced Intrusion Detection Environment (AIDE)
Hardening the Central Syslog Host
Using chroot Jails and User Mode Linux
Packet Filtering Using iptables
Hardening Your Physical Network Infrastructure
APPENDIXES A: Security Certifications
Security and Linux-Related Websites
52.15.147.20