Real World Linux Security. Intrusion Prevention, Detection, And Recovery, 2nd Edition, Cd-Rom Included

Note moyenne 
Bob Toxen - Real World Linux Security. Intrusion Prevention, Detection, And Recovery, 2nd Edition, Cd-Rom Included.
Stop today's most vicious Internet attackers-right in their tracks! Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready!... Lire la suite
58,10 € Neuf
Expédié sous 2 à 4 semaines
Livré chez vous entre le 14 mai et le 28 mai
En librairie

Résumé

Stop today's most vicious Internet attackers-right in their tracks! Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks-and arm you with breakthrough resources for protecting yourself! Surprising new IP Tables research every netadmin must know about; New techniques and software for detecting and blocking ARP and Switch attacks; Important enhancements to Linux-based adaptive firewalls; Thoroughly revised coverage of Samba security for Windows clients; 802.11b wireless networks security; How to make the most of Logcheck, Portsentry, and other new monitoring tools; VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more; Includes all-new chapter on physical security; Reviewed by some of the world's leading Linux security experts!

Sommaire

  • SECURING YOUR SYSTEM
    • Quick fixes for common problems
    • Quick and easy hacking and how to avoid it
    • Common hacking by subsystem
    • Common hacker attacks
    • Advanced security issues
    • Establishing security policies
    • Trusting other computers
    • Gutsy break-ins
    • Case studies
    • Recent break-ins
  • PREPARING FOR AN INTRUSION
    • Hardening your system
    • Preparing your hardware
    • Preparing your configuration
    • Scanning your own system
  • DETECTING AN INTRUSION
    • Monitoring activity
    • Scanning your system for anomalies
  • RECOVERING FROM AN INTRUSION
    • Regaining control of your system
    • Finding and repairing the damage
    • Finding the attacker's system
    • Having the cracker crack rocks

Caractéristiques

  • Date de parution
    06/02/2003
  • Editeur
  • Collection
  • ISBN
    0-13-046456-2
  • EAN
    9780130464569
  • Présentation
    Broché
  • Nb. de pages
    840 pages
  • Poids
    1.205 Kg
  • Dimensions
    18,0 cm × 23,5 cm × 2,8 cm

Avis libraires et clients

Avis audio

Écoutez ce qu'en disent nos libraires !

À propos de l'auteur

Biographie de Bob Toxen

BOB TOXEN has 28 years of UNIX/Linux experience. One of the 162 recognized developers of Berkeley UNIX, he learned about security as a student at UC Berkeley, where he cracked several of the original UNIX systems there. He is now President of Fly-By-Day Consulting, specializing in Linux and network security, firewalls, VPNs, 24/7 network monitoring, response, and administration for clients worldwide. In 2002, his recommendations were included in a report on improving U.S. intelligence that was presented to President Bush at the President's request. Toxen currently works with the U.S. Centers for Disease Control and Prevention to combat bioterrorism.

Du même auteur

Derniers produits consultés

58,10 €