Table of Contents for
Practical UNIX and Internet Security, 3rd Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Practical UNIX and Internet Security, 3rd Edition by Alan Schwartz Published by O'Reilly Media, Inc., 2003
  1. Cover
  2. Practical Unix & Internet Security, 3rd Edition
  3. A Note Regarding Supplemental Files
  4. Preface
  5. Unix “Security”?
  6. Scope of This Book
  7. Which Unix System?
  8. Conventions Used in This Book
  9. Comments and Questions
  10. Acknowledgments
  11. A Note to Would-Be Attackers
  12. I. Computer Security Basics
  13. 1. Introduction: Some Fundamental Questions
  14. What Is Computer Security?
  15. What Is an Operating System?
  16. What Is a Deployment Environment?
  17. Summary
  18. 2. Unix History and Lineage
  19. History of Unix
  20. Security and Unix
  21. Role of This Book
  22. Summary
  23. 3. Policies and Guidelines
  24. Planning Your Security Needs
  25. Risk Assessment
  26. Cost-Benefit Analysis and Best Practices
  27. Policy
  28. Compliance Audits
  29. Outsourcing Options
  30. The Problem with Security Through Obscurity
  31. Summary
  32. II. Security Building Blocks
  33. 4. Users, Passwords, and Authentication
  34. Logging in with Usernames and Passwords
  35. The Care and Feeding of Passwords
  36. How Unix Implements Passwords
  37. Network Account and Authorization Systems
  38. Pluggable Authentication Modules (PAM)
  39. Summary
  40. 5. Users, Groups, and the Superuser
  41. Users and Groups
  42. The Superuser (root)
  43. The su Command: Changing Who You Claim to Be
  44. Restrictions on the Superuser
  45. Summary
  46. 6. Filesystems and Security
  47. Understanding Filesystems
  48. File Attributes and Permissions
  49. chmod: Changing a File’s Permissions
  50. The umask
  51. SUID and SGID
  52. Device Files
  53. Changing a File’s Owner or Group
  54. Summary
  55. 7. Cryptography Basics
  56. Understanding Cryptography
  57. Symmetric Key Algorithms
  58. Public Key Algorithms
  59. Message Digest Functions
  60. Summary
  61. 8. Physical Security for Servers
  62. Planning for the Forgotten Threats
  63. Protecting Computer Hardware
  64. Preventing Theft
  65. Protecting Your Data
  66. Story: A Failed Site Inspection
  67. Summary
  68. 9. Personnel Security
  69. Background Checks
  70. On the Job
  71. Departure
  72. Other People
  73. Summary
  74. III. Network and Internet Security
  75. 10. Modems and Dialup Security
  76. Modems: Theory of Operation
  77. Modems and Security
  78. Modems and Unix
  79. Additional Security for Modems
  80. Summary
  81. 11. TCP/IP Networks
  82. Networking
  83. IP: The Internet Protocol
  84. IP Security
  85. Summary
  86. 12. Securing TCP and UDP Services
  87. Understanding Unix Internet Servers and Services
  88. Controlling Access to Servers
  89. Primary Unix Network Services
  90. Managing Services Securely
  91. Putting It All Together: An Example
  92. Summary
  93. 13. Sun RPC
  94. Remote Procedure Call (RPC)
  95. Secure RPC (AUTH_DES)
  96. Summary
  97. 14. Network-Based Authentication Systems
  98. Sun’s Network Information Service (NIS)
  99. Sun’s NIS+
  100. Kerberos
  101. LDAP
  102. Other Network Authentication Systems
  103. Summary
  104. 15. Network Filesystems
  105. Understanding NFS
  106. Server-Side NFS Security
  107. Client-Side NFS Security
  108. Improving NFS Security
  109. Some Last Comments on NFS
  110. Understanding SMB
  111. Summary
  112. 16. Secure Programming Techniques
  113. One Bug Can Ruin Your Whole Day . . .
  114. Tips on Avoiding Security-Related Bugs
  115. Tips on Writing Network Programs
  116. Tips on Writing SUID/SGID Programs
  117. Using chroot( )
  118. Tips on Using Passwords
  119. Tips on Generating Random Numbers
  120. Summary
  121. IV. Secure Operations
  122. 17. Keeping Up to Date
  123. Software Management Systems
  124. Updating System Software
  125. Summary
  126. 18. Backups
  127. Why Make Backups?
  128. Backing Up System Files
  129. Software for Backups
  130. Summary
  131. 19. Defending Accounts
  132. Dangerous Accounts
  133. Monitoring File Format
  134. Restricting Logins
  135. Managing Dormant Accounts
  136. Protecting the root Account
  137. One-Time Passwords
  138. Administrative Techniques for Conventional Passwords
  139. Intrusion Detection Systems
  140. Summary
  141. 20. Integrity Management
  142. The Need for Integrity
  143. Protecting Integrity
  144. Detecting Changes After the Fact
  145. Integrity-Checking Tools
  146. Summary
  147. 21. Auditing, Logging, and Forensics
  148. Unix Log File Utilities
  149. Process Accounting: The acct/pacct File
  150. Program-Specific Log Files
  151. Designing a Site-Wide Log Policy
  152. Handwritten Logs
  153. Managing Log Files
  154. Unix Forensics
  155. Summary
  156. V. Handling Security Incidents
  157. 22. Discovering a Break-in
  158. Prelude
  159. Discovering an Intruder
  160. Cleaning Up After the Intruder
  161. Case Studies
  162. Summary
  163. 23. Protecting Against Programmed Threats
  164. Programmed Threats: Definitions
  165. Damage
  166. Authors
  167. Entry
  168. Protecting Yourself
  169. Preventing Attacks
  170. Summary
  171. 24. Denial of Service Attacks and Solutions
  172. Types of Attacks
  173. Destructive Attacks
  174. Overload Attacks
  175. Network Denial of Service Attacks
  176. Summary
  177. 25. Computer Crime
  178. Your Legal Options After a Break-in
  179. Criminal Hazards
  180. Criminal Subject Matter
  181. Summary
  182. 26. Who Do You Trust?
  183. Can You Trust Your Computer?
  184. Can You Trust Your Suppliers?
  185. Can You Trust People?
  186. Summary
  187. VI. Appendixes
  188. A. Unix Security Checklist
  189. Preface
  190. Chapter 1: Introduction: Some Fundamental Questions
  191. Chapter 2: Unix History and Lineage
  192. Chapter 3: Policies and Guidelines
  193. Chapter 4: Users, Passwords, and Authentication
  194. Chapter 5: Users, Groups, and the Superuser
  195. Chapter 6: Filesystems and Security
  196. Chapter 7: Cryptography Basics
  197. Chapter 8: Physical Security for Servers
  198. Chapter 9: Personnel Security
  199. Chapter 10: Modems and Dialup Security
  200. Chapter 11: TCP/IP Networks
  201. Chapter 12: Securing TCP and UDP Services
  202. Chapter 13: Sun RPC
  203. Chapter 14: Network-Based Authentication Systems
  204. Chapter 15: Network Filesystems
  205. Chapter 16: Secure Programming Techniques
  206. Chapter 17: Keeping Up to Date
  207. Chapter 18: Backups
  208. Chapter 19: Defending Accounts
  209. Chapter 20: Integrity Management
  210. Chapter 21: Auditing, Logging, and Forensics
  211. Chapter 22: Discovering a Break-In
  212. Chapter 23: Protecting Against Programmed Threats
  213. Chapter 24: Denial of Service Attacks and Solutions
  214. Chapter 25: Computer Crime
  215. Chapter 26: Who Do You Trust?
  216. Appendix A: Unix Security Checklist
  217. Appendix B: Unix Processes
  218. Appendixes C, D, and E: Paper Sources, Electronic Sources, and Organizations
  219. B. Unix Processes
  220. About Processes
  221. Signals
  222. Controlling and Examining Processes
  223. Starting Up Unix and Logging In
  224. C. Paper Sources
  225. Unix Security References
  226. Other Computer References
  227. D. Electronic Resources
  228. Mailing Lists
  229. Web Sites
  230. Usenet Groups
  231. Software Resources
  232. E. Organizations
  233. Professional Organizations
  234. U.S. Government Organizations
  235. Emergency Response Organizations
  236. Index
  237. Index
  238. Index
  239. Index
  240. Index
  241. Index
  242. Index
  243. Index
  244. Index
  245. Index
  246. Index
  247. Index
  248. Index
  249. Index
  250. Index
  251. Index
  252. Index
  253. Index
  254. Index
  255. Index
  256. Index
  257. Index
  258. Index
  259. Index
  260. Index
  261. Index
  262. Index
  263. About the Authors
  264. Colophon
  265. Copyright

Other Computer References

The following books and articles are of general interest to all practitioners of computer security, with Unix or other operating systems.

Computer Crime and Law

  1. Freedman, David H., and Charles C. Mann. @ Large; New York, NY, 1997. A story about a huge computer crime spree caused entirely by two people. This incident spawned the FBI Computer Crime Squad, some FIRST teams, and the writing of the Tripwire tool at Purdue.

  2. Icove, David, Karl Seger, and William VonStorch, Computer Crime: A Crimefighter’s Handbook , Sebastopol, CA: O’Reilly & Associates, 1995. A popular rewrite of an FBI training manual. Dated and out of print (though available as used), but with some worthy material.

  3. Power, Richard. Tangled Web; Indianapolis, IN, Que, 2002. A collection of stories of cybercrime and investigation. Cites a number of statistics to give a snapshot of the problem.

Computer-Related Risks

  1. Leveson, Nancy G. Safeware: System Safety and Computers. A Guide to Preventing Accidents and Losses Caused by Technology. Reading, MA: Addison-Wesley, 1995. This textbook contains a comprehensive exploration of the dangers of computer systems, and explores ways in which software can be made more fault-tolerant and safety-conscious.

  2. Neumann, Peter G. Computer Related Risks. Reading, MA: Addison-Wesley, 1995. Dr. Neumann moderates the Internet RISKS mailing list. This book is a collection of the most important stories passed over the mailing list since its creation.

Computer Viruses and Programmed Threats

  1. Communications of the ACM , Volume 32, Number 6, June 1989 (the entire issue). This whole issue was devoted to issues surrounding the Internet Worm incident.

  2. Denning, Peter J. Computers Under Attack: Intruders, Worms and Viruses. Reading, MA: ACM Press/Addison-Wesley, 1990. A comprehensive collection of readings related to these topics, including reprints of many classic articles. Mainly of historical interest.

  3. Ferbrache, David. The Pathology of Computer Viruses. London, England: Springer-Verlag, 1992. This was probably the best all-around book on the technical aspects of computer viruses.

  4. Hoffman, Lance J., Rogue Programs: Viruses, Worms and Trojan Horses. New York, NY: Van Nostrand Reinhold, 1990. A comprehensive collection of readings on viruses, worms, and the like. Mainly of historical interest.

  5. T he Virus Bulletin. Virus Bulletin CTD. Oxon, England. A monthly international publication on computer virus prevention and removal. This is an outstanding publication about computer viruses and virus prevention. It is likely to be of value only to sites with a significant PC population, however. The publication also sponsors conferences that have good papers on viruses (see http://www.virusbtn.com).

Cryptography Books

  1. Denning, Dorothy E. R. Cryptography and Data Security . Reading, MA: Addison-Wesley, 1983. The classic textbook in the field. Now out of print but worth having.

  2. Garfinkel, Simson. PGP: Pretty Good Privacy . Sebastopol, CA: O’Reilly & Associates, 1994. Describes the history of cryptography, the history of the program PGP, and explains PGP’s use.

  3. Hinsley, F.H., and Alan Stripp. Code Breakers: The Inside Story of Bletchley Park. Oxford, England: Oxford University Press, 1993. Full of interesting historical vignettes.

  4. Hoffman, Lance J. Building in Big Brother: The Cryptographic Policy Debate. New York, NY: Springer-Verlag, 1995. An interesting collection of papers and articles about the Clipper Chip, Digital Telephony legislation, and public policy on encryption. Mainly of historical interest.

  5. Kahn, David. The Codebreakers: The Story of Secret Writing. New York, NY: Macmillan Company, 1996. The definitive history of cryptography.

  6. Schneier, Bruce. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition. New York, NY: John Wiley & Sons, 1996. A comprehensive, unclassified book about computer encryption and data-privacy techniques.

  7. Singh, Simon. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. NY: Anchor Books, 2000. A compelling, popular account of code making and code breaking. Singh focuses on Turing’s cracking of the German codes, the use of the Rosetta Stone to crack the code of the ancient Egyptian language, and the modern development of the RSA encryption system. This book has much insight and many stories that are missing from other popular accounts of cryptography. Highly recommended.

  8. Wayner, Peter. Disappearing Cryptography; Boston, MA: Academic Press, 1996. Contains good coverage of steganography.

Cryptography Papers and Other Publications

  1. Association for Computing Machinery. “Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy.” Report of a Special Panel of the ACM U.S. Public Policy Committee. Location: USACM, June 1994. (http://info.acm.org/reports/acm_crypto_study.html)

  2. Diffie, Whitfield. “The First Ten Years of Public-Key Cryptography.” Proceedings of the IEEE 76 (1988), 560-76. Whitfield Diffie’s tour-de-force history of public key cryptography, with revealing commentaries.

  3. Diffie, Whitfield, and M.E. Hellman. “New Directions in Cryptography.” IEEE Transactions on Information Theory IT-22 (1976). The article that introduced the concept of public key cryptography.

  4. Lai, Xuejia. “On the Design and Security of Block Ciphers.” ETH Series in Information Processing 1 (1992). The article describing the IDEA cipher.

  5. LaMacchia, Brian A. and Andrew M. Odlyzko. “Computation of Discrete Logarithms in Prime Fields.” Designs, Codes, and Cryptography. (1991), 46-62.

  6. Lenstra, A. K., H. W. Lenstra, Jr., M.S. Manasse, and J. M. Pollard. “The Number Field Sieve.” Proceedings of the 22nd ACM Symposium on the Theory of Computing. Baltimore MD: ACM Press, 1990, 564-72.

  7. Merkle, Ralph. “Secure Communication Over Insecure Channels.” Communications of the ACM 21 (1978), 294-99 (submitted in 1975). The article that should have introduced the concept of public key cryptography.

  8. Merkle, Ralph, and Martin E. Hellman. “On the Security of Multiple Encryption.” Communications of the ACM 24 (1981), 465-67.

  9. Merkle, Ralph, and Martin E. Hellman. “Hiding Information and Signatures in Trap Door Knapsacks.” IEEE Transactions on Information Theory 24 (1978), 525-30.

  10. Rivest, Ron, A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public Key Cryptosystems.” Communications of the ACM 21 (1978).

General Computer Security

  1. Amoroso, Edward. Fundamentals of Computer Security Technology. Englewood Cliffs, NJ: Prentice Hall, 1994. A very readable and complete introduction to computer security at the level of a college text.

  2. Anderson, Ross. Security Engineering. New York, NY: John Wiley & Sons, 2001. A comprehensive book on end-to-end system design with security in mind.

  3. Bace, Rebecca. Intrusion Detection. Indianapolis, IN: Macmillan, 2000. An excellent book on the history and structure of intrusion detection systems for hosts and networks.

  4. Computers & Security . This is a journal published eight times each year by Elsevier Press, Oxford, England. (Order from Elsevier Press, +44-(0) 865-512242.) It is one of the main journals in the field. This journal is priced for institutional subscriptions, not individuals. Each issue contains pointers to dozens of other publications and organizations that might be of interest, as well as referenced articles, practicums, and correspondence. (The URL for the web page is included in “Security Periodicals.”)

  5. Gasser, Morrie. Building a Secure Computer System. New York, NY: Van Nostrand Reinhold, 1988. A solid introduction to issues of secure system design. Most of the principles still aren’t followed in modern systems (unfortunately).

  6. Gollmann, Dieter. Computer Security. Chichester, UK: John Wiley & Sons, 1999. A good survey textbook, widely used in academic settings.

  7. Hunt, A. E., S. Bosworth, and D. B. Hoyt, eds. Computer Security Handbook, Third Edition. New York, NY: John Wiley & Sons, 1995. A massive and thorough collection of essays on all aspects of computer security.

  8. Pfleeger, Charles P. Security in Computing, Third Edition. Englewood Cliffs, NJ: Prentice Hall, 3rd edition. 2002. Another good introduction to computer security.

  9. Russell, Deborah, and G. T. Gangemi, Sr. Computer Security Basics. Sebastopol, CA: O’Reilly & Associates, 1991. An excellent introduction to many areas of computer security and a summary of government security requirements and issues. Somewhat dated, but still of value.

  10. Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World. New York, NY: John Wiley & Sons, 2000. Experts who really understand security know that people and processes are often the weak link, and that even the best technology is insufficient in the face of careless operation. Schneier is well-known for his writing in the subject of cryptography, and this book presents the epiphany when he finally understood a few of the deeper truths of security.

  11. Thompson, Ken. “Reflections on Trusting Trust.” Communications of the ACM, Volume 27, Number 8, August 1984. This is a “must-read” for anyone seeking to understand the limits of computer security and trust.

  12. Viega, John and Gary McGraw. Building Secure Software. Indianapolis, IN: Pearson/Addison-Wesley, 2002. An excellent book about how to code secure software, and the pitfalls of haphazard coding and deployment.

  13. Wood, Charles Cresson, et al. Computer Security: A Comprehensive Controls Checklist. New York, NY: John Wiley & Sons, 1987. Contains many comprehensive and detailed checklists for assessing the state of your own computer security and operations.

Network Technology and Security

  1. Bellovin, Steve and Bill Cheswick. Firewalls and Internet Security. Reading, MA: Addison-Wesley, 1994. The classic book on firewalls. This book will teach you almost everything you need to know about how firewalls work, but it will leave you without implementation details unless you happen to have access to the full source code to the Unix operating system and a staff of programmers who can write bug-free code.

  2. Comer, Douglas E. Internetworking with TCP/IP, Fourth Edition. Englewood Cliffs, NJ: Prentice Hall, 2000. A complete, readable reference that describes how TCP/IP networking works, including information on protocols, tuning, and applications.

  3. Costales, Bryan with Eric Allman. Sendmail, Third Edition. Sebastopol, CA: O’Reilly & Associates, 2002. The definitive guide to configuring the most popular mailer on the planet, co-authored by the program’s owner.

  4. Garfinkel, Simson with Gene Spafford. Web Security, Privacy & Commerce. Sebastopol, CA: O’Reilly & Associates, 2001. The definitive guide to securing web servers.

  5. Hunt, Craig. TCP/IP Network Administration, Third Edition. Sebastopol, CA: O’Reilly & Associates, 2002. This book is an excellent system administrator’s overview of TCP/IP networking (with a focus on Unix systems), and a very useful reference to major Unix networking services and tools such as BIND (the standard Unix DNS server) and sendmail (the standard Unix SMTP server).

  6. Kaufman, Charles, Radia Perlman, and Mike Speciner. Network Security: Private Communications in a Public World, Second Edition. Englewood Cliffs, NJ: Prentice Hall, 2002. This book provides outstanding coverage of the various protocols, mechanisms, and algorithms used in securing network access and communication. It contains particularly good presentations on network authentication and access control systems.

  7. Stallings, William. Cryptography and Network Security: Principles and Practice s. Englewood Cliffs, NJ: Prentice Hall, 2003. A good introductory textbook.

  8. Stevens, Richard W. Unix Network Programming. Englewood Cliffs, NJ: Prentice Hall, 1995. Covers the basic and advanced features of programming with sockets on Unix systems.

  9. Zwicky, Elizabeth D., D., Simon Cooper, and Brent Chapman . Building Internet Firewalls . Sebastopol, CA: O’Reilly & Associates, 1995. A good how-to book that describes in clear detail how to build your own firewall.

Security Products and Services Information

  1. Computer Security Buyer’s Guide . Computer Security Institute, San Francisco, CA. (Order from CSI, 415-905-2626.) Contains a comprehensive list of computer security hardware devices and software systems that are commercially available. The guide is free with membership in the Institute. The URL is http://www.gocsi.com.

Understanding the Computer Security “Culture”

All of these publications describe the historical and future views of computer networks that are much discussed (and emulated) by system attackers.

  1. Brunner, John. Shockwave Rider. New York, NY: A Del Ray Book, published by Ballantine, 1975. One of the first descriptions of a computer worm.

  2. Dreyfus, Suelette. Underground. Australia: Reed Books, 1997. A book about the exploits of several Australian hackers relatively early on. Some of the story is incorrect, however, as the author failed to contact all parties to verify the facts.

  3. Gibson, William. Burning Chrome , Neuromancer , Count Zero , Mona Lisa Overdrive , Virtual Light , Idoru , and All Tomorrow’s Parties . New York, NY: Bantam Books. Cyberpunk books by the science fiction author who coined the term “cyberspace.”

  4. Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York, NY: Simon & Schuster, 1991. Tells the stories of three hackers— Kevin Mitrick, Pengo, and Robert T. Morris.

  5. Levy, Steven. Hackers: Heroes of the Computer Revolution. New York, NY: Dell Books, 1984. One of the original publications describing the “hacker ethic.”

  6. Littman, Jonathan, The Fugitive Game: Online with Kevin Mitnick. Boston, MA: Little, Brown, 1996. A year prior to his capture in 1995, Jonathan Littman had extensive telephone conversations with Kevin Mitnick and learned what it was like to be a computer hacker on the run. This is the story.

  7. Mitnick, Kevin D. and William L. Simon. The Art of Deception: Controlling the Human Element. New York, NY: John Wiley & Sons, 2002. A revealing collection of fictional stories loosely based on this famed criminal’s personal experiences in subverting computer systems by exploiting human foibles. Be sure to read the unauthorized preface on the Internet that Mitnick’s publisher forced him to remove.

  8. Shimomura, Tsutomu, with John Markoff. Takedown: The Pursuit and Capture of Kevin Mitnick, America’s Most Wanted Computer Outlaw—By the Man Who Did it. New York, NY: Hyperion, 1995. On Christmas Day, 1994, an attacker broke into Tsutomu Shimomura’s computer. A few weeks later, Shimomura was asked to help out with a series of break-ins at two major Internet service providers in the San Fransisco area. Eventually, the trail led to North Carolina, where Shimomura participated in the tracking and capture of Kevin Mitnick. This is the story, written by Shimomura and Markoff. Markoff is the New York Times journalist who covered the capture.

  9. Sterling, Bruce. The Hacker Crackdown : Law and Disorder on the Electronic Frontier. This book is available in several places on the Web. http://www-swiss.ai.mit.edu/~bal/sterling/contents.html is one location; other locations can be found in the CERIAS hotlist.

  10. Stoll, Cliff. The Cuckoo’s Egg. Garden City, NY: Doubleday, 1989. An amusing and gripping account of tracing a computer intruder through the networks. The intruder was later found to be working for the KGB and trying to steal sensitive information from U.S. systems.

  11. Varley, John. Press Enter. Reprinted in several collections of science fiction, including Blue Champagne, Ace Books, 1986; Isaac Asimov’s Science Fiction Magazine, 1984; and Tor SF Doubles, Tor Books, October 1990.

  12. Vinge, Vernor. True Names and Other Dangers. New York, NY: Baen, distributed by Simon & Schuster, 1987. This is a classic science fiction story that presages both virtual reality and the use of “handles” in online communications. Reading the story now may result in a “so what?” response, but when it was originally published, these concepts were not generally known. Some of the story has yet to come to pass, and it is still worth reading.

Unix Programming and System Administration

  1. Albitz, Paul and Cricket Liu. DNS and BIND , Fourth Edition. Sebastopol, CA: O’Reilly & Associates, 2001. An excellent reference for setting up DNS nameservers.

  2. Bach, Maurice. The Design of the UNIX Operating System. Englewood Cliffs, NJ: Prentice Hall, 1986. Good background about how the internals of Unix work. Basically oriented toward older System V Unix, but with details applicable to every version.

  3. Bolsky, Morris I. and David G. Korn. The New Kornshell Command and Programming Language , Second Edition. Englewood Cliffs, NJ: Prentice Hall, 1995. This is a complete tutorial and reference to ksh—the only shell some of us use when given the choice, and the inspiration for the POSIX shell standard used by bash and others.

  4. Harbison, Samuel P. and Guy L. Steele Jr.. C, a Reference Manual. Englewood Cliffs, NJ: Prentice Hall, 1984. The classic description of the C programming language.

  5. Kernighan, Brian, Dennis Ritchie, and Rob Pike. The UNIX Programming Environment. Englewood Cliffs, NJ: Prentice Hall, 1984. A nice guide to the Unix philosophy and how to build shell scripts and command environments under Unix.

  6. McKusick, Marshall Kirk, Keith Bostic, Michael Karels, and John Quarterman. The Design and Implementation of the 4.4 BSD UNIX Operating System. Reading, MA: Addison-Wesley, 1996. This book can be viewed as the BSD version of Maurice Bach’s book. It is a readable and detailed description of how and why the BSD Unix system is designed the way it is.

  7. Nemeth, Evi, Garth Snyder, Scott Seebass, and Trent R. Hein. UNIX System Administration Handbook, Third Edition. Englewood Cliffs, NJ: Prentice Hall, 2000. An excellent reference on the various ins and outs of running a Unix system. This book includes information on system configuration, adding and deleting users, running accounting, performing backups, configuring networks, running sendmail, and much more. Highly recommended.

  8. Welsh, Matt, Lar Kaufman, Matthias K. Dalheimer, and Terry Dawson. Running Linux, Fourth Edition. Sebastopol, CA: O’Reilly & Associates, 2002. A practical and readable guide to the Linux operating system.

Miscellaneous References

  1. Hawking, Stephen W. A Brief History of Time: From the Big Bang to Black Holes. New York, NY: Bantam Books, 1988. Want to know the age of the universe? It’s in here, although Unix is not.

  2. Miller, Barton P., Lars Fredriksen, and Bryan So. “An Empirical Study of the Reliability of UNIX Utilities.” Communications of the ACM, Volume 33, Number 12, December 1990, 32-44. A thought-provoking report of a study showing how Unix utilities behave when given unexpected input. See the Fuzz archive at http://www.cs.wisc.edu/~bart/fuzz/ for recent papers and source code.

  3. Salus, Peter H. A Quarter Century of Unix. Reading, MA: Addison-Wesley, 1994. The definitive history of the Unix operating system and the attempts to commercialize it.

  4. Schwartz, Randal L. and Tom Phoenix. Learning Perl, Third Edition. Sebastopol, CA: O’Reilly & Associates, 2001. A painless way to learn the Perl language from the beginning.

  5. Wall, Larry, Tom Christiansen, and Jon Orwant. Programming Perl, Third Edition. Sebastopol, CA: O’Reilly & Associates, 2000. The definitive reference to the Perl scripting language. A must for anyone who does much shell, awk, or sed programming or would like to quickly write some applications in Unix.

Security Periodicals

Computer Audit Update
Computer Fraud & Security Update
Computer Law & Security Report
Computers & Security
Elsevier Advanced Technology
Crown House, Linton Rd.
Barking, Essex I611 8JU
England
Voice: 44 81 5945942
Fax: 44 81 5945942
Telex: 896950 APPSCI G
North American Distributor:
P.O. Box 882
New York, NY 10159
Voice: (212) 989-5800
http://www.elsevier.nl/catalogue/
Computer Security Alert
Computer Security Journal
Computer Security Buyers Guide
Computer Security Institute
600 Harrison Street
San Francisco, CA 94107
Voice: (415 ) 905-2626
http://www.gocsi.com
CSO Magazine
CXO Media, Inc.
492 Old Connecticut Path
Framingham, MA 01701
Voice: (508) 935-4591
http://www.csonline.com/
Disaster Recovery Journal
P.O. Box 510110
St. Louis, MO 63151
Voice: (314) 894-0276
http://www.scmagazine.com
Information Security
85 Astor Ave., Suite 2
Norwood, MA 02062
Voice: (314) 894-0276
http://www.infosecuritymag.com
SC Magazine (InfoSecurity News)
West Coast Publishing, Inc.
161 Worcester Roac, Suite 201
Framingham, MA 01701
Voice: (508) 879-9792
http://www.scmagazine.com