Security for network


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security for network
# 1  
Old 10-30-2001
<A HREF="http://www1.fatbrain.com/asp/bookinfo/bookinfo.asp?theisbn=1565921488&vm=">Practical Unix & Internet Security<BR>
<IMG SRC="http://a1204.g.akamai.net/7/1204/1401/00082717011/images.barnesandnoble.com/images/1820000/1823113.gif"></A>
<BR>

is a good one, although it is now a little dated (2nd edition published 1995), the discussions are still relevant.


Anything by Bruce Schneier is also very good. His monthly <A HREF="http://www.counterpane.com/crypto-gram.html">Cryptogram</A> email newsletter is recommended reading for anyone interested in security.
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. Cybersecurity

Network security course

Hi I was wondering if someone could give some tips about network security postgraduate courses and/or certifications . I know that is a generic question and a wide area, but that's the problem, the net is full of books, courses, or whatever. My goal is to find a good course (or book) that... (0 Replies)
Discussion started by: Dedalus
0 Replies

2. What is on Your Mind?

Career in Networking & Network Security

Hii i want to make career in networking and i m new in this field could u plz help me what should i do (2 Replies)
Discussion started by: pawan_kumar
2 Replies

3. UNIX for Advanced & Expert Users

Network Shell Script & Blade Logic & Network Security

I am going to take up a position in Data & Network Security. I would need to write network shell scripts doing the following task: Going to around 2000 servers and findout which groups has access to each servers and which ids are there in each group that has access. I need to implement... (1 Reply)
Discussion started by: pinnacle
1 Replies

4. Shell Programming and Scripting

NIS, Network security

Hi, I am about to take up task of shell scripting in Network Security. Just started on job. But everything looks new NIS etc.. I tried googling to find systematic explanation of network security terms and how to script for that. But was unable to find. Could anyone of you please direct me to... (1 Reply)
Discussion started by: tostay2003
1 Replies

5. Cybersecurity

Network Security

Hi, I'm currently in a Technical Writing class and I decided to do a report on network security. I need a primary source for this and decided that I would poll you fine people on your prefrences in security related software to get said primary source. 1. What webserver would you consider to be... (1 Reply)
Discussion started by: TYLERofDOOM
1 Replies

6. Cybersecurity

Unix Network Security Admin

Hello peoples, I could really use some expert advice. Currently I am starting my curriculumn in CompSci. I am very interested in Unix, Shell Programming and Network Security. I would Like to work in Compusec/Infosec........fight system vulnerability for my future employer. What Cert would you... (3 Replies)
Discussion started by: pacman-iac
3 Replies
Login or Register to Ask a Question
IP-NETNS(8)							       Linux							       IP-NETNS(8)

NAME
ip-netns - process network namespace management SYNOPSIS
ip [ OPTIONS ] netns { COMMAND | help } ip netns { list } ip netns { add | delete } NETNSNAME ip netns identify PID ip netns pids NETNSNAME ip netns exec NETNSNAME command ... ip netns monitor DESCRIPTION
A network namespace is logically another copy of the network stack, with its own routes, firewall rules, and network devices. By convention a named network namespace is an object at /var/run/netns/NAME that can be opened. The file descriptor resulting from opening /var/run/netns/NAME refers to the specified network namespace. Holding that file descriptor open keeps the network namespace alive. The file descriptor can be used with the setns(2) system call to change the network namespace associated with a task. For applications that are aware of network namespaces, the convention is to look for global network configuration files first in /etc/netns/NAME/ then in /etc/. For example, if you want a different version of /etc/resolv.conf for a network namespace used to isolate your vpn you would name it /etc/netns/myvpn/resolv.conf. ip netns exec automates handling of this configuration, file convention for network namespace unaware applications, by creating a mount namespace and bind mounting all of the per network namespace configure files into their traditional location in /etc. ip netns list - show all of the named network namespaces This command displays all of the network namespaces in /var/run/netns ip netns add NAME - create a new named network namespace If NAME is available in /var/run/netns/ this command creates a new network namespace and assigns NAME. ip netns delete NAME - delete the name of a network namespace If NAME is present in /var/run/netns it is umounted and the mount point is removed. If this is the last user of the network names- pace the network namespace will be freed, otherwise the network namespace persists until it has no more users. ip netns delete may fail if the mount point is in use in another mount namespace. ip netns identify PID - Report network namespaces names for process This command walks through /var/run/netns and finds all the network namespace names for network namespace of the specified process. ip netns pids NAME - Report processes in the named network namespace This command walks through proc and finds all of the process who have the named network namespace as their primary network names- pace. ip netns exec NAME cmd ... - Run cmd in the named network namespace This command allows applications that are network namespace unaware to be run in something other than the default network namespace with all of the configuration for the specified network namespace appearing in the customary global locations. A network namespace and bind mounts are used to move files from their network namespace specific location to their default locations without affecting other processes. ip netns monitor - Report as network namespace names are added and deleted This command watches network namespace name addition and deletion events and prints a line for each event it sees. EXAMPLES
ip netns list Shows the list of current named network namespaces ip netns add vpn Creates a network namespace and names it vpn ip netns exec vpn ip link set lo up Bring up the loopback interface in the vpn network namespace. SEE ALSO
ip(8) AUTHOR
Original Manpage by Eric W. Biederman iproute2 16 Jan 2013 IP-NETNS(8)