Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
About This E-Book Title Page Copyright Page Dedications Contents at a Glance Table of Contents Foreword Preface Acknowledgments About the Author 1. Overall Security Concepts
Section 1: Security Fundamentals
Essential Security Principles Basic Password Security
Section 2: Security Practices Against a Knowledgeable Attacker
Security Best Practices Password-Cracking Techniques Password-Cracking Countermeasures
Section 3: Security Practices Against an Advanced Attacker
Advanced Password-Cracking Techniques Advanced Password-Cracking Countermeasures
Summary
2. Workstation Security
Section 1: Security Fundamentals
Workstation Security Fundamentals Web Security Fundamentals Introduction to Tails Download, Validate, and Install Tails Use Tails
Section 2: Additional Workstation Hardening
Workstation Disk Encryption BIOS Passwords Tails Persistence and Encryption
Section 3: Qubes
Introduction to Qubes Qubes Download and Installation The Qubes Desktop An AppVM Compartmentalization Example Split GPG USB VM
Summary
3. Server Security
Section 1: Server Security Fundamentals
Fundamental Server Security Practices SSH Configuration Sudo
Section 2: Intermediate Server-Hardening Techniques
SSH Key Authentication AppArmor Remote Logging
Section 3: Advanced Server-Hardening Techniques
Server Disk Encryption Secure NTP Alternatives Two-Factor Authentication with SSH
Summary
4. Network
Section 1: Essential Network Hardening
Network Security Fundamentals Man-in-the-Middle Attacks Server Firewall Settings
Section 2: Encrypted Networks
OpenVPN Configuration SSH Tunnels SSL/TLS-Enabled Load Balancing
Section 3: Anonymous Networks
Tor Configuration Tor Hidden Services
Summary
5. Web Servers
Section 1: Web Server Security Fundamentals
Permissions HTTP Basic Authentication
Section 2: HTTPS
Enable HTTPS Redirect HTTP to HTTPS HTTPS Reverse Proxy HTTPS Client Authentication
Section 3: Advanced HTTPS Configuration
HSTS HTTPS Forward Secrecy Web Application Firewalls
Summary
6. Email
Section 1: Essential Email Hardening
Email Security Fundamentals Basic Email Hardening
Section 2: Authentication and Encryption
SMTP Authentication SMTPS
Section 3: Advanced Hardening
SPF DKIM DMARC
Summary
7. DNS
Section 1: DNS Security Fundamentals
Authoritative DNS Server Hardening Recursive DNS Server Hardening
Section 2: DNS Amplification Attacks and Rate Limiting
DNS Query Logging Dynamic DNS Authentication
Section 3: DNSSEC
How DNS Works DNS Security Issues How DNSSEC Works DNSSEC Terminology Add DNSSEC to a Zone
Summary
8. Database
Section 1: Database Security Fundamentals
Essential Database Security Local Database Administration Database User Permissions
Section 2: Database Hardening
Database Network Access Control Enable SSL/TLS
Section 3: Database Encryption
Full Disk Encryption Application-Side Encryption Client-Side Encryption
Summary
9. Incident Response
Section 1: Incident Response Fundamentals
Who Performs Incident Response? Do You Prosecute? Pull the Plug Image the Server Server Redeployment Forensics
Section 2: Secure Disk Imaging Techniques
Choose the Imaging System Create the Image Introduction to Sleuth Kit and Autopsy
Section 3: Walk Through a Sample Investigation
Cloud Incident Response
Summary
Appendix A. Tor
What Is Tor?
Why Use Tor?
How Tor Works Security Risks
Outdated Tor Software Identity Leaks
Appendix B. SSL/TLS
What Is TLS?
Why Use TLS?
How TLS Works
Deciphering Cipher Names
TLS Troubleshooting Commands
View the Contents of a Certificate View the Contents of a CSR Troubleshoot a Protocol over TLS
Security Risks
Man-in-the-Middle Attacks Downgrade Attacks Forward Secrecy
Index Code Snippets
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion