Real world linux security:intrusion prevention detection & recovery -... - Librairie Eyrolles
Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Real world linux security:intrusion prevention detection & recovery
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Real world linux security:intrusion prevention detection & recovery

Real world linux security:intrusion prevention detection & recovery

Bob Toxen

694 pages, parution le 15/09/2000

Résumé

BOB TOXEN -
"A comprehensive guide to system security---covers everything from hardening a system to system recovery after an attack."

-Steve Bourne, Creator of the Bourne Shell

Your enemy is coming-are you ready?

It's nota question of "if" but "when." Will you be readyto protectyour system when a cracker comes to call' Real Worid Linux Security goes beyond the books that merely cetail system vulnerabilities; it offers system administrators practical solutions for safeguarding Linux systems and actively responding to break-in attempts. Veteran Bob Toxen shows you how to know your enemies and stop them at the front gate before they can damage your system.

The hands-on guide to protecting your linux data-and yourself

-7 Deadly of Linux security

-Set up effective firewalls

-Break-in case studies

-Develop internal security policies

-Block spam

-Recover quickly from an intrusion

ABOUT THE CD-ROM The accompanying CD contains original software that locks out crackers and alerts system administrators. In addition, it includes programs that monitor system health and report suspicious activities, detect network sniffers, and speed backup and recovery.

Table of Contents

  • Introduction
  • Securing your system
  • Quick fixes for common problems
  • Quick and easy break-ind and how to avoid them
  • Common break-ins by subsystem
  • Common attacks
  • Advanced security issues
  • Establishing security policies
  • Trusting other computers
  • Gutsy Break-ins
  • Case studies
  • Recent Break-ins
  • Preparing for an intusion
  • Hardening your system
  • Preparing your hardware
  • Prepating your configuration
  • Scanning your own system
  • Detecting an intusion
  • Monitoring activity
  • Scanning From an Intrusion
  • Regaining control of your system
  • Finding and repairing the damage
  • Finding the Attacker's system
  • Having the cracker crack roks
  • Internet resources for the latest
  • Inrusions and defenses
  • Books, CD-Roms and videos
  • Appendix C
  • Network services and ports
  • Appendix D The ports C Listing
  • Appendix E
  • The Blockip CSH Listing
  • Appendix F
  • The fpromisc.CSH Listing
  • Appendix G
  • The overwrite Listing
  • Appendix H
  • Danger Levels

L'auteur - Bob Toxen

Bob Toxen has 26 years of UNIX/Linux experience, and is one of the 168 recognized developers of Berkeley UNIX. He learned about security as a student at UC Berkeley, when he played for "the other team," successfully cracking several of the original UNIX systems there. He is president of Fly-By-Day Consulting, specializing in Linux security, client/server creation, system administration, porting, and C programming.

Caractéristiques techniques

  PAPIER
Éditeur(s) Prentice Hall
Auteur(s) Bob Toxen
Parution 15/09/2000
Nb. de pages 694
Format 17,8 x 23,4
Couverture Broché
Poids 1186g
Intérieur Noir et Blanc
EAN13 9780130281876

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription