Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone who knows which systems are vulnerable and how crackers get into them--this unique guide to Linux security identifies existing and potential security holes and faults, and then describes how to go about fixing them.
"Sinopsis" puede pertenecer a otra edición de este libro.
Linux machines serve scores of purposes on networks, but their very integration with networked environments means they're constantly exposed to attack. Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Network provides a comprehensive picture of Linux's strengths and weaknesses when it comes to protecting your systems from bad guys. The author offers explicit advice (e.g., replace sendmail with Qmail) and general recommendations (e.g., be on the lookout for unused services and disable them). In case you're wondering which Anonymous this is, he's the same guy who wrote the very highly regarded Maximum Security.
In Maximum Linux Security, readers become familiar with scores of offensive and defensive weapons, including Crack, Tripwire, linux_sniffer, mendax, and many more. For each program, the author documents the required infrastructure (such as C or Perl), the required permissions, and a URL from which the program can be downloaded. Most valuably, he walks you through the use of each program (using Red Hat Linux 5.1 and Caldera OpenLinux 1.3 on his test bed machines). Readers can follow along as the author performs various hacks, including an IP spoofing attack. He lists hundreds of hacking tools in an appendix, and includes a lot of software (Linux security products, code examples, technical documents, system logs, and utilities) on the companion CD-ROM. --David Wall
Topics covered: Sniffers, scanners, firewalls, auditing tools, intrusion detectors, and denial-of-service software.About the Author:
The author is an experienced computer hacker who now works as a writer, trainer, Internet and Unix site manager, and security consultant in California.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Estado de conservación: Brand New. Book Condition: Brand New. Nº de ref. de la librería 97806723167081.0
Descripción SAMS PUBLISHING, 1999. Paperback. Estado de conservación: New. book. Nº de ref. de la librería 0672316706
Descripción SAMS PUBLISHING, 1999. Paperback. Estado de conservación: New. Nº de ref. de la librería DADAX0672316706
Descripción SAMS PUBLISHING, 1999. Paperback. Estado de conservación: New. Nº de ref. de la librería P110672316706
Descripción SAMS PUBLISHING. PAPERBACK. Estado de conservación: New. 0672316706 New Condition. Nº de ref. de la librería NEW6.3131691
Descripción Longman Group. Estado de conservación: New. pp. 743. Nº de ref. de la librería 7600734