Now, there's an up-to-the-minute, hands-on guide to using open source tools to protect any Linux system! Completely updated for the newest tools and distributions, Linux System Security, Second Edition covers virtually every facet of Linux Security, from firewalls and intrusion detection to authentication and secure Web services. You'll master over a dozen crucial open source Security tools, including sudo, portmap, xinetd, Tiger, tripwire, ipchains, pam, crack, and more. Along the way, three long-time Linux sysadmins will show you the "gotchas," rules of thumb, and undocumented tricks it would take you years to learn on your own! • Preparing Linux systems for a production environment • Using Bastille to lock clown Linux systems without unnecessarily compromising their functionality • Combatting Trojan horses, backdoors, password cracking, buffer overflows, spoofing, DoS, and more • OpenSSH: eliminating eavesdropping, connection hijacking, and other network-level attacks • Detecting intrusions with network sniffers and port scanners • Protecting mixed Linux/UNIX environments • Understanding Security policies • Firewalls, email, Web services, filesystems, applications, and much more Want the benefits of Linux without the Security risks? Get Linux System Security, Second Edition!
"Sinopsis" puede pertenecer a otra edición de este libro.
SCOTT MANN is a Linux software engineer at LeftHand Networks in Colorado. He has previously specialized in Linux and UNIX systems for both SGI and Sun Microsystems. His previous Prentice Hall PTR books include Linux TCP/IP Network Administration.
ELLEN L. MITCHELL is a security analyst at Texas A&M University, where she is responsible for campus network security, development, and administration. She currently maintains the Tiger UNIX security package.
MITCHELL KRELL, Ph.D., is a former university professor turned consultant. He currently travels around the country teaching classes and consulting for various government agencies on a variety of topics including Linux, IRIX, system administration, networking, web development, and computer security.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: BooksRun, Philadelphia, PA, Estados Unidos de America
Hardcover. Condición: Good. Subsequent. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience. Nº de ref. del artículo: 0130470112-11-1
Cantidad disponible: 1 disponibles
Librería: -OnTimeBooks-, Phoenix, AZ, Estados Unidos de America
Condición: very_good. Gently read. May have name of previous ownership, or ex-library edition. Binding tight; spine straight and smooth, with no creasing; covers clean and crisp. Minimal signs of handling or shelving. 100% GUARANTEE! Shipped with delivery confirmation, if you're not satisfied with purchase please return item for full refund. Ships USPS Media Mail. Nº de ref. del artículo: OTV.0130470112.VG
Cantidad disponible: 1 disponibles
Librería: Ann Becker, Houston, TX, Estados Unidos de America
hardback. Condición: Very Good. Estado de la sobrecubierta: No Dust Jacket. Second Edition. 9.5 X 7.3 X 1.5 inches; 857 pages. Nº de ref. del artículo: 343648
Cantidad disponible: 1 disponibles
Librería: Goodwill of Silicon Valley, SAN JOSE, CA, Estados Unidos de America
Condición: acceptable. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Acceptable condition! Any other included accessories are also in Acceptable condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear such as cover tears discoloration, staining, marks, scuffs, etc. All pages intact. Nº de ref. del artículo: GWSVV.0130470112.A
Cantidad disponible: 1 disponibles