
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Operating Systems | >> | Linux Security Cookb... |
ISBN
:
9788173667183
Publisher
:
Shroff/o'reilly
Subject
:
Operating Systems
Binding
:
Paperback
Pages
:
340
Year
:
2003
₹
325.0
₹
269.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused piecesof code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the 'recipes' you'll find in this book are:Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and moreMonitoring your network with tcpdump, dsniff, netstat, and other toolsProtecting network connections with Secure Shell (SSH) and stunnelSafeguarding email sessions with Secure Sockets Layer (SSL)Encrypting files and email messages with GnuPGProbing your own security with password crackers, nmap, and handy scriptsThis cookbook's proven techniques are derived from hard-won experience. Whether you're responsiblefor security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
Author Biography
sDaniel J. Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He is the author of O'Reilly's Linux Pocket Guide, and he is the coauthor of Linux Security Cookbook, and SSH, The Secure Shell: The Definitive Guide.Richard Silverman first touched a computer as a college junior in 1986, when he logged into a DEC-20, typed MM to send some mail, and was promptly lost to the world. He eventually resurfaced and discovered he had a career, which was convenient but somewhat disorienting, since he hadn't really been looking for one. Since earning his B.A. in computer science and M.A. in pure mathematics, Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, computer security, and Unix systems administration. He is a co-author on two O'Reilly titles: SSH, The Secure Shell (The Definitive Guide), and the Linux Security Cookbook.Robert G. Byrnes, Ph.D., has been hacking on Unix systemsfor twenty years, and has been involved with security issues since the original Internet worm was launched from Cornell University, while he was a graduate student and system administrator. He is currently a software engineer at Curl Corporation, and has worked in the fields of networking, telecommunications, distributed computing, financial technology, and condensed matter physics.
Related Items
-
of
Information Security Governance Simplified: From the Boardroom to the Keyboard
Todd Fitzgerald
Starts At
5256.0
6490.0
19% OFF
Intelligence And Security Informatics: Techniques And Applications, Volume 135
Hsinchun Chen
Starts At
20471.0
21324.0
4% OFF
The Linux TCP/IP Stack: Networking for Embedded Systems (B/CD), 604 Pages
Thomas F Herbert
Starts At
423.0
450.0
6% OFF
DB2 Security and Compliance Solutions for Linux, UNIX, and Windows, 288 Pages
Whei-jen Chen
Starts At
332.0
350.0
5% OFF
DB2 Workload Manager for Linux, UNIX, and Windows, 382 Pages
Whei-jen Chen
Starts At
423.0
450.0
6% OFF
DB2 9 for Linux, UNIX, and Windows Database Administration: Certification Study Guide: Exam 731, 882 Pages
Roger E. Sanders
Starts At
1044.0
1200.0
13% OFF
High Performance Linux Cluster with OSCAR, Rocks, OpenMosix, and MPI, 380 Pages
Joseph D. Sloan
Starts At
332.0
350.0
5% OFF
Linux Network Administrator’s Guide, 3/ed, 372 Pages
Tony Bautts
Starts At
528.0
600.0
12% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary