Hacking Exposed Linux 3rd Edition

Linux Security Secrets and Solutions

Specificaties
Paperback, 613 blz. | Engels
McGraw-Hill Computing | 3e druk, 2008
ISBN13: 9780072262575
Rubricering
Hoofdrubriek : Computer en informatica
McGraw-Hill Computing 3e druk, 2008 9780072262575
Gratis verzonden | Verwachte levertijd ongeveer 11 werkdagen

Samenvatting

The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network-whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, 'Hacking Exposed Linux, 3rd Edition' provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

- Secure Linux by using attacks and countermeasures from the latest OSSTMM research
- Follow attack techniques of PSTN, ISDN, and PSDN over Linux
- Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
- Block Linux signal jamming, cloning, and eavesdropping attacks
- Apply Trusted Computing and cryptography tools for your best defense
- Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
- Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
- Find and repair errors in C code with static analysis and Hoare Logic

Specificaties

ISBN13:9780072262575
Taal:Engels
Bindwijze:paperback
Aantal pagina's:613
Druk:3

Inhoudsopgave

Foreword
Acknowledgments
Introduction

Part 1: Security and Controls
1. Applying Security
2. Applying Interactive Controls
3. Applying Process Controls

Part 2: Hacking the System
4. Local Access Control
5. Data Networks Security
6. Unconventional Data Attack Vectors
7. Voice over IP
8. Wireless Networks
9. Input/Output Devices
10. RFID-Radio Frequency Identification
11. Emanation Attacks
12. Trusted Computing

Part 3: Hacking the Users
13. Web Application Hacking
14. Mail Services
15. Name Services

Part 4: Care and Maintenance
16. Reliability: Static Analysis of C Code
17. Security Tweaks in the Linux Kernel

Part 5: Appendixes
Appendix A: Management and Maintenance
Appendix B: Linux Forensics and Data Recovery
Appendix C: BSD

Index

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Hacking Exposed Linux 3rd Edition