Now, there's an up-to-the-minute, hands-on guide to using open source tools to protect any Linux system! Completely updated for the newest tools and distributions, Linux System Security, Second Edition covers virtually every facet of Linux Security, from firewalls and intrusion detection to authentication and secure Web services. You'll master over a dozen crucial open source Security tools, including sudo, portmap, xinetd, Tiger, tripwire, ipchains, pam, crack, and more. Along the way, three long-time Linux sysadmins will show you the "gotchas," rules of thumb, and undocumented tricks it would take you years to learn on your own! • Preparing Linux systems for a production environment • Using Bastille to lock clown Linux systems without unnecessarily compromising their functionality • Combatting Trojan horses, backdoors, password cracking, buffer overflows, spoofing, DoS, and more • OpenSSH: eliminating eavesdropping, connection hijacking, and other network-level attacks • Detecting intrusions with network sniffers and port scanners • Protecting mixed Linux/UNIX environments • Understanding Security policies • Firewalls, email, Web services, filesystems, applications, and much more Want the benefits of Linux without the Security risks? Get Linux System Security, Second Edition!
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
SCOTT MANN is a Linux software engineer at LeftHand Networks in Colorado. He has previously specialized in Linux and UNIX systems for both SGI and Sun Microsystems. His previous Prentice Hall PTR books include Linux TCP/IP Network Administration. ELLEN L. MITCHELL is a Security analyst at Texas A&M University, responsible for campus network Security, development, and administration. She currently maintains the Tiger UNIX Security package. MITCHELL KRELL, Ph.D., is a former university professor turned consultant. He currently travels around the country teaching classes and consulting for various government agencies on a variety of topics, including Linux, IRIX, system administration, networking, Web development, and computer Security.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 9,90 expédition depuis Allemagne vers France
Destinations, frais et délaisVendeur : Buchmarie, Darmstadt, Allemagne
Etat : Good. N° de réf. du vendeur 3403461_e01_2x
Quantité disponible : 1 disponible(s)
Vendeur : Goodwill of Silicon Valley, SAN JOSE, CA, Etats-Unis
Etat : acceptable. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Acceptable condition! Any other included accessories are also in Acceptable condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear such as cover tears discoloration, staining, marks, scuffs, etc. All pages intact. N° de réf. du vendeur GWSVV.0130470112.A
Quantité disponible : 1 disponible(s)
Vendeur : dsmbooks, Liverpool, Royaume-Uni
Hardcover. Etat : Good. Good. book. N° de réf. du vendeur D7S9-1-M-0130470112-4
Quantité disponible : 1 disponible(s)