Hack Proofing Linux

Edgar Danielyan

,

James Stanger

,

Patrick-T Lane

Note moyenne 
Edgar Danielyan et James Stanger - Hack Proofing Linux.
Hack Proofing Linux shows experienced system administrators how to deploy Open Source tools in three key areas: host security, network security, and perimeter... Lire la suite
50,50 €
Actuellement indisponible

Résumé

Hack Proofing Linux shows experienced system administrators how to deploy Open Source tools in three key areas: host security, network security, and perimeter security. It provides you with the skills to lock down your network, secure and monitor the operating system, and scan local and remote networks for weaknesses. Learn how to maintain, test, and log a firewall so you have a functional barrier between you and the outside world. Stop a hacker by thinking like one. Master the steps to hack your operating system and anticipate various types of attacks. Harden the server. Learn the steps for securing a Linux system using manual methods and Open Source solutions. Learn to use system scanning tools. Find complete coverage of scanning tools including AntiVir, Zombie Zapper, and Nmap. Understand Intrusion Detection Systems. Read about the services provided by an IDS and about different IDS applications and their features. Capture network traffic. Use network sniffers to troubleshoot the network and confirm hacker attacks. Minimize improper use of packet capturing tools. Learn how to use one-time passwords, Kerberos v5, and encryption solutions. Deploy secure authentication and encryption at the network layer. Establish network security by using Virtual Private Networks (VPNs). Establish a safe network perimeter. Configure and maintain a firewall to protect your network. The Hack Proofing Linux Wallet CD. The CD comes with many Open Source tools and source code from the book, as well as an electronic version of the book in HTML format. Register for your 1-year upgrade. The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!

Sommaire

    • Introduction to Open Source Security
    • Hardening the Operating System
    • System Scanning and Probing
    • Implementing an Intrusion Detection System
    • Troubleshooting the Network with Sniffers
    • Network Authentication and Encryption
    • Avoiding Sniffing Attacks through Encryption
    • Creating Virtual Private Networks
    • Implementing a Firewall with Ipchains and Iptables
    • Deploying the Squid Web Proxy Cache Server
    • Maintaining Firewalls

Caractéristiques

  • Date de parution
    01/01/2001
  • Editeur
  • ISBN
    1-928994-34-2
  • EAN
    9781928994343
  • Présentation
    Broché
  • Nb. de pages
    671 pages
  • Poids
    1.205 Kg
  • Dimensions
    19,0 cm × 23,0 cm × 3,8 cm

Avis libraires et clients

Avis audio

Écoutez ce qu'en disent nos libraires !

Les clients ont également aimé

Derniers produits consultés