Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Digital Lifestyle | >> | Maximum Linux Securi... |
ISBN
:
9788176353755
Publisher
:
Bpb Publicatons
Subject
:
Digital Lifestyle, Operating Systems
Binding
:
Paperback
Pages
:
297
Year
:
2008
₹
297.0
₹
225.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.Maximum Linux Security helps Linux administrators identify and plug security holes on their systems by detailing Linux system holes, attack methods, and hacker's tools that hackers have had years to study, explore, and improve upon. As Linux continues to become more and more mainstream, network administrators will need to know all about the weaknesses in Linux systems that hackers and crackers have had years to learn and explore. Maximum Linux Security provides a crash course on the vulnerabilities of Linux systems, and how to protect these systems from outside attacks. Written from the same hacker perspective as Maximum Security, this book contains everything the Linux network administrator needs to know about protecting his or her systems. This edition of the book has been revised, expanded, and updated to cover the latest advances in Linux hacking tools and techniques, and to more thoroughly cover firewalls, intrusion detection, Linux graphical environments, and routersTable of ContentsIntroduction.I. LINUX SECURITY BASICS.1. Introducing Linux Security.2. Physical Security3. Installation Issues4. Basic Linux System Administration. .II. LINUX USER SECURITY.5. Password Attacks.6. Data Attacks. III. LINUX NETWORK SECURITY.7. Malicious Code.8. Sniffers and Electronic Eavesdropping.9. Scanners.10. Spoofing. IV. LINUX INTERNET SECURITY.11. FTP Security.12. Mail Security.13. Telnet and SSH Security. 14. Web Server Security. 15. Secure Web Protocols.16. Secure Web Development.17. File Sharing Security.18. Denial-of-Service Attacks.19. Linux and Firewalls.20. Intrusion Detection.21. Logs and Audit Trails.22. Disaster Recovery. V. APPENDIXES.Appendix A. Linux Security Command Reference. Appendix B. Linux Security Index-Older Linux Security Issues. Appendix C. Other Useful Linux Security Tools. Appendix D. Sources for More Information.Appendix E. Glossary. Index.
Related Items
-
of
The Rough Guide to Cloud Computing (Rough Guide Reference Series)
Peter Buckley
Starts At
262.0
350.0
25% OFF
Knowledge: Everything You Really Need to Know about the Internet
John Naughton
Starts At
379.0
499.0
24% OFF
Adobe Flash Animation: Creative Storytelling for Web and TV
Philip Carrera
Starts At
1874.0
2568.0
27% OFF
Creating a 3D Animated CGI Short: The Making of the Autiton Archives Fault Effect - Pilot Webisode
Michael Scaramozzino
Starts At
3184.0
3932.0
19% OFF
Smart Client Deployment with ClickOnce: Deploying Windows Forms Applications withClickOnce
Brian Noyes
Starts At
2801.0
3838.0
27% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary