Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 94.
A Guide to Open Source Security James Stanger, Patrick T. Lane. 1 YEAR UPGRADE BUYER PROTECTION PLAN Your Guide to Open Source Security • Step-by-Step Instructions for Deploying Open Source Security Tools • Hundreds of Tools & Traps and ...
A Guide to Open Source Security James Stanger, Patrick T. Lane. 1 YEAR UPGRADE BUYER PROTECTION PLAN Linux: A Guide to Open Source Security The Only Way to Stop a Hacker Is to Think Like One James Stanger Patrick T. Lane TM Linux: A ...
... Open Source Security Copyright © 2001 by Syngress Publishing, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or dis ...
A Guide to Open Source Security James Stanger, Patrick T. Lane. About. the. CD. This book is accompanied by a CD containing files and open source programs used throughout the book.The files include configuration examples, packet captures ...
A Guide to Open Source Security James Stanger, Patrick T. Lane. Foreword xxvii Using the GNU Chapter 1 Introduction to Open General Public License The GNU General Public License(GPL) isthe basis oftheopen source movement. This license is ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |