Hack Proofing Linux: A Guide to Open Source SecurityElsevier, 2001. gada 6. jūl. - 512 lappuses From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.
|
No grāmatas satura
1.–5. rezultāts no 77.
... updates for any affected chapters. s “Ask the Author”TM customer query forms that enable you to post questions to our authors and editors. s Exclusive monthly mailings in which our experts provide answers to reader queries and clear ...
... Update Schedules 6 Command-Line Dominance 6 Lack of Backward Compatibility and No Regular Distribution Body 7 Inconvenient Upgrade Paths 7 Conflicts in Supporting Libraries and Limited Platform Support 7 Interface Changes 8 Partially ...
... Updating the Operating System Red Hat Linux Errata and Update Service Packages Handling Maintenance Issues Red Hat Linux Errata: Fixes and Advisories Bug Fix Case Study Manually Disabling Unnecessary Services and Ports Services to ...
... Mode Licensing AntiVir Exercise: Updating AntiVir Using TkAntivir Required Libraries and Settings 53 53 54 55 55 63 64 74 79 79 80 82 86 90 92 93 96 97 97 100 101 103 104 107 109 110 110 110 112 114 114 114 116 117 Contents xiii.
... Updating Nessus Understanding Differential, Detached, and Continuous Scans Exercise: Conducting Detached and Differential Scans with Nessus Summary Solutions FastTrack Frequently Asked Questions 146 147 147 148 151 153 154 154 155 157 ...
Saturs
1 | |
41 | |
109 | |
Chapter 4 Implementing an Intrusion Detection System | 191 |
Chapter 5 Troubleshooting the Network with Sniffers | 261 |
Chapter 6 Network Authentication and Encryption | 299 |
Chapter 7 Avoiding Sniffing Attacks through Encryption | 353 |
Chapter 8 Creating Virtual Private Networks | 391 |
Chapter 9 Implementing a Firewall with Ipchains and Iptables | 445 |
Chapter 10 Deploying the Squid Web Proxy Cache Server | 507 |
Chapter 11 Maintaining Firewalls | 543 |
Appendix A Bastille Log | 599 |
Appendix B Hack Proofing Linux Fast Track | 605 |
Index | 637 |
Related Titles | 674 |
Citi izdevumi - Skatīt visu
Hack Proofing Linux: A Guide to Open Source Security, the Only Way to Stop a ... James Stanger Priekšskatījums nav pieejams - 2001 |