
Maximum Linux Security
A Hacker's Guide to Protecting Your Linux Server and Workstation
Résumé
servers, a book focusing just on Linux and its inherent strengths and weaknesses as a
platform for Web and file servers is long overdue. In the same manner as the original
bestselling Maximum Security, Maximum Linux Security details all the Linux system holes,
attack methods, and hacker's tools that hackers have had years to study, explore, and
improve upon --helping Linux administrators identify and plug security holes on their
systems.
- A controversial, comprehensive guide to Linux
security--written by the same
anonymous hacker who wrote the bestselling Maximum Security
- Covers hundreds of Linux system holes, attack methods,
hacker's tools, and security
techniques
- Learn the weaknesses in Linux systems
- CD-ROM contains Linux security products, code examples,
technical documents,
system logs, utilities and other practical items for implementing Internet and computer
system security on a Linux system
Table of contents
- Introduction
- Part I: Linux Security Basics
- Chapter 1: Introducing Linux
- Chapter 2: Physical Security
- Chapter 3: Installation Issues
- Chapter 4: Basic Linux System Administration
- Part II: Linux User Security
- Chapter 5: Password Attacks
- Chapter 6: Malicious Code
- Part III: Linux Network Security
- Chapter 7: Sniffers and Electronic Eavesdropping
- Chapter 8: Scanners
- Chapter 9: Spoofing
- Chapter 10: Protecting Data in Transit
- Part IV: Linux Internet Security
- Chapter 11: FTP Security
- Chapter 12: Mail Security
- Chapter 13: Telnet Security
- Chapter 14: Web Server Security
- Chapter 15: Secure Web Protocols
- Chapter 16: Secure Web Development
- Chapter 17: Denial-of-Service Attacks
- Chapter 18: Linux and Firewalls
- Chapter 19: Logs and Audit Trails
- Chapter 20: Intrusion Detection
- Chapter 21: Disaster Recovery
- Part V: Appendixes
- Appendix A: Linux Security Command Reference
- Appendix B: Linux Security Index-Past Linux Security
Issues
- Appendix C: Other Useful Linux Security Tools
- Appendix D: Sources for More Information
- Appendix E: Glossary
- Index
L'auteur - Anonymous and al.
Anonymous is an experienced computer hacker who
specializes in testing security of various networking
platforms. He was convicted of a series of financial crimes
in the late 1980s and now works as a writer, trainer, and
security consultant.
Greg Shipley is CTO for Neohapsis, an information security
consultancy. He is a contributing editor with Network
Computing magazine.
Jonathan Feldman is a contributing editor with Network
Computing magazine, where he writes a column and frequently
contributes technical workshops.
Robert Blader works at the Naval Surface Warfare Center,
where he performs intrusion detection, security training,
and network forensics. He has contributed to SANS GIAC
courses and SysAdmin magazine.
Chad Cook has worked for ten years in security, with
emphasis on secure product architecture, network and
operating system security, and new security
technologies.
David Harley maintains a number of virus and security
related information resources and writes regularly for
Virus Bulletin.
Joe Jenkins is a system administrator/security consultant
with NoWalls, Inc. and writes for magazines such as
SecurityFocus.
L.J. Locher is a network adminstrator, programmer, and
security consultant who has written articles for Windows
2000 Magazine.
Toby Miller is a security engineer for Advanced Systems
Development and is the author of several papers published
for SecurityFocus and the SANS Institute.
Brooke Paul works as an information technology and security
consultant.
Nicholas Raba is a well-known expert on Macintosh
security.
Gregory White is Vice President of profession services at
SecureLogix, and is a former professor of computer science
at the US Air Force Academy.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Sams |
Auteur(s) | Anonymous and al. |
Parution | 15/10/1999 |
Nb. de pages | 742 |
Format | 18,7 x 23 |
Poids | 1300g |
EAN13 | 9780672316708 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse