eBooks-it.org Logo
eBooks-IT.org Inner Image

Hack Proofing Linux

A Guide to Open Source Security

Hack Proofing Linux Image

Book Details:

Publisher:Syngress
Series: Syngress
Author:James Stanger
Edition:1
ISBN-10:1928994342
ISBN-13:9781928994343
Pages:704
Published:Jul 10 2001
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:11.81 MB

Book Description:

From the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.* Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need* CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community* Uses forensics-based analysis to give the reader an insight to the mind of a hacker

Download Link:

Related Books:

Knoppix Hacks

Tips and Tools for Using the Linux Live CD to Hack, Repair, and Enjoy Your PC
Knoppix Hacks Image
2nd Edition
If you think Knoppix is just a Linux demo disk, think again. Klaus Knopper created an entire Linux distribution on a bootable CD (and now a DVD) so he could use his favorite open source tools on any computer. This book includes a collection of tips and techniques for using the enormous amount of software Knoppix offers-not just to work and play, but also to troubleshoot, repair, upgrade, and disinfect your system without having to install a thing.Knoppix Hacks is just like the distribution it covers: a veritable Swiss Army knife packed full of tools. Scores of industrial-strength hacks-many of them new to this second edition-cover both the standard Kno...

Hack the Stack

Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
Hack the Stack Image
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and w...

Hack I.T.

Security Through Penetration Testing
Hack I.T. Image
"This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previously unknown black art." --From the Foreword by Simple Nomad, Senior Security Analyst, BindView RAZOR Team Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from compromising systems and exploiting...



2007 - 2021 © eBooks-IT.org