Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real World Linux Security (2nd Edition)

Buy

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks—and arm you with breakthrough resources for protecting yourself!

  • Surprising new IP Tables research every netadmin must know about
  • New techniques and software for detecting and blocking ARP and Switch attacks
  • Important enhancements to Linux-based adaptive firewalls
  • Thoroughly revised coverage of Samba security for Windows clients
  • 802.11b wireless networks security
  • How to make the most of Logcheck, Portsentry, and other new monitoring tools
  • VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more
  • Includes all-new chapter on physical security
  • Reviewed by some of the world's leading Linux security experts!
Web Site

The accompanying web site contains the author's own state-of-the-art software for instantly locking out hackers and alerting system administrators. The website contents also include exclusive IP Tables and IP Chains firewall scripts (rule sets), as well as powerful new tools for monitoring network health, detecting and reporting suspicious activities, securing backups, simplifying recovery, and much more.

 

About the Author
BOB TOXEN has 28 years of UNIX/Linux experience. One of the 162 recognized developers of Berkeley UNIX, he learned about security as a student at UC Berkeley, where he cracked several of the original UNIX systems there. He is now President of Fly-By-Day Consulting, specializing in Linux and network security, firewalls, VPNs, 24x7 network monitoring, response, and administration for clients worldwide. In 2002, his recommendations were included in a report on improving U.S. intelligence that was presented to President Bush at the President's request. Toxen currently works with the U.S. Centers for Disease Control and Prevention to combat bioterrorism.

(HTML tags aren't allowed.)

Dungeons and Dragons 4th Edition For Dummies
Dungeons and Dragons 4th Edition For Dummies

Open the book and find:

  • Everything a new player needs to get started playing D&D

  • Details on four fantasy races and four iconic classes

  • Explanations of every number and statistic on the character sheet

  • ...
Professional Windows Live Programming (Programmer to Programmer)
Professional Windows Live Programming (Programmer to Programmer)
Professional Windows Live Programming

This step-by-step guide demystifies the next generation of Microsoft web programming—Windows Live. An exciting new set of tools and features, Windows Live can change the way you design, build, and market web sites. Experienced author Jon Arking presents you with a comprehensive...

Spatial Modeling in Forest Resources Management: Rural Livelihood and Sustainable Development (Environmental Science and Engineering)
Spatial Modeling in Forest Resources Management: Rural Livelihood and Sustainable Development (Environmental Science and Engineering)
This book demonstrates the measurement, monitoring, mapping, and modeling of forest resources. It explores state-of-the-art techniques based on open-source software & R statistical programming and modeling specifically, with a focus on the recent trends in data mining/machine learning techniques and robust modeling in forest resources....

The Inside Text: Social, Cultural and Design Perspectives on SMS (The Computer Supported Cooperative Work Series)
The Inside Text: Social, Cultural and Design Perspectives on SMS (The Computer Supported Cooperative Work Series)
Mobile phones and the short-text messaging service (SMS or “text”) in particular
are new social phenomena, much marvelled at and much commented upon (See
Brown et al, 2002; Katz & Aakhus, 2002; Ling, 2004). This success is said to be
because mobiles allow new levels of micromanagement in an age of fraught and...
Developing Secure Applications with Visual Basic
Developing Secure Applications with Visual Basic

Using client-proven methods, and over 15 years of programming experience, expert author Davis Chapman empowers developers to create powerful, secure applications. Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own...

CJKV Information Processing: Chinese, Japanese, Korean & Vietnamese Computing
CJKV Information Processing: Chinese, Japanese, Korean & Vietnamese Computing

First published a decade ago, CJKV Information Processing quickly became the unsurpassed source of information on processing text in Chinese, Japanese, Korean, and Vietnamese. It has now been thoroughly updated to provide web and application developers with the latest techniques and tools for disseminating information directly...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy