Practical Guide to Software Quality Management (Artech House Computing Library)

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] lame delegation

latency, network layer 3 devices layered approach ld.so (runtime loader)

ldd command 2nd 3rd least privilege 2nd legal compliance less binary level configuration parameter (syslog.conf) 2nd 3rd Linux operating system 2nd Listen directive (httpd)

load balancing 2nd

loader.conf file LoadModule directive local attacks 2nd

local facility 2nd

local security

local service (Postfix)

localhost     Autopsy and

     connections from     mod_include and

     NFS master jail and     NTP and     packets and     restricting access to log analysis 2nd 3rd

log files

     administrators and

     automated monitoring

     capturing

     logcheck and

     managing

log keyword

log option (ipfw)

logcheck 2nd 3rd

logfilename field (newsyslog)

logger command 2nd

logging

     BIND 9

     configuring basic     denied traffic 2nd

     executed privileged commands

     IPFW option 2nd

     mail access and

     PF and 2nd     Postfix and     reaching limits

     remote     Snort and     sockets 2nd     syslogd actions

     systemloghosts     cryptcat and     defined     encryption and     logging to     protecting

     restricting access

     securing     Syslog relay and     syslog-ng and

     syslogd and

login banners 2nd

login classes 2nd 3rd

login.conf file 2nd logout, automatic

logsentry logtail binary

lpd (line printer spooler daemon) 2nd 3rd lpr facility 2ndls command     ACLs and     creating devices 2nd

     -q option

     Trojan horses and

     viewing flags

 < Day Day Up >   

Категории