Preface; Acknowledgments; Introduction; KNOWLEDGE MATRIX; Theory of Operation; Base Systems; Shells and Commands; Systems Utilities; Applications; Troubleshooting; LABS AND EXERCISES; Network Policy; Setting up a Three-syslog Configuration; Basic ipchains; stunnel; Installing xinetd; Editing Global Options; netstat; swatch; Using Tripwire; Using Crack to Check for Weak Passwords; Using GnuPG; ipchains Part 2; nmap; Understanding and Using Secure Shell; super and sudo; Securing the LILO Boot Manager; Squid; chrooted FTP Server; Securing Sendmail; Using PAM to Limit CPU Usage; Securing NFS Exports; hosts.allow, hosts.deny, and hosts.lpd; Rootkits and Rootkit Detectors; PRACTICE QUESTIONS AND ANSWERS; Practice Questions; Answers; Glossary; Index.