Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux (Hacking Exposed)

Buy
Linux (Hacking Exposed), 9780072127737 (0072127732), McGraw-Hill, 2001

From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...

Learn how to think like a hacker in order to secure your Linux network

In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is constantly being compromised. Linux has always been considered the digital playground for hackers. Many hacks, exploits, and network security tools are written on Linux because it's readily available. Hacking Linux Exposed: Linux Security Secrets & Solutions shows you, step-by-step, how to defend against the latest Linux attacks by understanding the hacker's methods and sinister thought processes. You'll learn how your adversaries gather information, acquire targets, escalate privilege, gain control, plant back doors, and cover their tracks. Each chapter is divided into bite-sized chunks, covering highly publicized and little-known break-ins, tips on why they occurred, and detailed countermeasures that no Linux professional can afford to be without.

  • Get details on the security features of each Linux distribution, including Red Hat Linux, SuSE, Debian, and Slackware.
  • Zero in on vulnerable systems using whois, traceroute, DNS zone transfers, OS detection, ping sweeps, and port scans
  • Detect Trojan horses, backdoors, password cracking, IP spoofing, session hijacking, and trail hiding
  • Implement Log analysis tools such as the Advanced Intrusion Detection Environment (AIDE) and advanced kernel security patches, including the Linux Intrusion Detection System (LIDS)
  • Learn how to prevent local users from getting root privileges
  • Prevent Denial of Service and other network attacks
  • Configure FTP sites, DNS servers, and other daemons securely
  • Plug common and obscure security holes in Sendmail, Qmail, Postfix, POP, and IMAP servers
  • Defend against Web server attacks using secure scripting techniques, user verification, and secure Apache Server configurations
  • Design, position, and test secure firewalls and other network access restrictions
About the Author
Anne H. Carasik (Mountain, CA) has been working in the computer industry since 1992 on projects Brian Hatch (Mountain, CA) has been using UNIX since 1991 and as a UNIX Administration and Security Consultant for a variety of companies. George Kurtz brings his extensive knowledge of Unix security to the book to ensure its truly comprehensive network security coverage.
(HTML tags aren't allowed.)

Shape Interrogation for Computer Aided Design and Manufacturing
Shape Interrogation for Computer Aided Design and Manufacturing

Shape interrogation is the process of extraction of information from a geometric model. It is a fundamental component of Computer Aided Design and Manufacturing (CAD/CAM) systems. The authors focus on shape interrogation of geometric models bounded by free-form surfaces. Free-form surfaces, also called sculptured surfaces, are widely used in the...

Frommer's Bali & Lombok (Frommer's Complete)
Frommer's Bali & Lombok (Frommer's Complete)

Bali and Lombok, two islands in Indonesia, are ideal for adventure travelers, eco-tourists, and culture vultures. Frommer's Bali & Lombok includes information on:

  • Plan an adventurous vacation, whether you're hiking, practicing yoga, sailing, scuba diving, or surfing your way around Bali and Lombok.
  • ...
Beginning Hibernate, Second Edition
Beginning Hibernate, Second Edition

Beginning Hibernate, Second Edition is ideal if you’re experienced in Java with databases (the traditional, or “connected,” approach), but new to open source, lightweight Hibernate—the de facto object-relational mapping and database-oriented application development framework.

This book packs in brand-new...


Emotional Engineering vol. 2
Emotional Engineering vol. 2

In an age of increasing complexity, diversification and change, customers expect services that cater to their needs and to their tastes. Emotional Engineering vol 2. describes how their expectations can be satisfied and managed throughout the product life cycle, if producers focus their attention more on emotion. Emotional engineering...

An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications
An Introduction to LTE: LTE, LTE-Advanced, SAE and 4G Mobile Communications

An Introduction to LTE explains the technology used by 3GPP Long Term Evolution. The book covers the whole of LTE, both the techniques used for radio communication between the base station and the mobile phone, and the techniques used for signalling communication and data transport in the evolved packet core. It avoids unnecessary...

Foundations of BizTalk Server 2006
Foundations of BizTalk Server 2006

Since Microsoft's release of BizTalk Server 2006, there is a serious need for more documentation on this product. Foundations of BizTalk Server 2006 fills that void. The book will take you from novice to professional, equipping you with the tools you'll need to get started in the world of BizTalk server integration.

...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy