Red Hat Linux Internet Server
Paul G. Sery, Jay Beale
* Red Hat Linux X Internet Server takes the reader through all of the steps
of setting up an Internet server using the Red Hat Linux operating system.
* It begins by describing Red Hat Linux networking basics, two example networks and the basics of DSL Internet connections, firewalls and troubleshooting in Part 1.This sets the foundation for all subsequent examples and provides readers with problem solving tools.
* Part 2 describes how to construct and manage a secure web server that is connected to a database. Part 3 shows the reader how to construct basic Internet services such as DNS, sendmail, FTP and Samba. Part 4 deals with advanced management techniques.
* The final part describes how to secure your network and servers. This part goes beyond the average coverage by showing advanced as well as basic security techniques and tools.
ABOUT THE CD-ROM
The CD-ROM has an open-source high-availability system/server created by the author and appropriate GPL server and security software.
Table of Contents
Part I: Building a Linux Network.
Chapter 1: Introducing the Example Networks.
Chapter 2: Configuring Red Hat Linux Networking.
Chapter 3: Connecting to the Internet via DSL.
Chapter 4: Building a Firewall.
Chapter 5: Introducing Basic Troubleshooting.
Part II: Building a World Wide Web Server.
Chapter 6: Configuring a Basic Apache Server.
Chapter 7: Connecting a Database to the Web Server.
Chapter 8: Building a Simple Audio Streaming Server.
Part III: Providing Basic Internet Services.
Chapter 9: Building a Domain Name Server.
Chapter 10: Creating an SMTP E-mail Server.
Chapter 11: Configuring FTP.
Chapter 12: Configuring Samba.
Part IV: Managing Your Linux Servers.
Chapter 13: Automating Network Backups.
Chapter 14: Increasing the Reliability of a Linux Server.
Part V: Increasing Security.
Chapter 15: Introducing Basic Server Security.
Chapter 16: Introducing Secure System Administration.
Chapter 17: Hardening the System.
Chapter 18: Introducing Simple Intrusion Detection Systems.
Chapter 19: Log Monitoring and Incident Response.
Appendix A: What's Stored at www.wiley.com?
Appendix B: Configuring a Dial-up Internet Connection.
Appendix C: Automating Your Server.
Appendix D: Using DHCP.