Personnaliser

OK

Linux System Security - An Administrator's Guide To Open Source Security Tools, 2nd Edition - Krell Mitchell

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre
Aucun vendeur ne propose ce produit

Soyez informé(e) par e-mail dès l'arrivée de cet article

Créer une alerte prix
Publicité
 
Vous avez choisi le retrait chez le vendeur à
  • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
  • Récupérez le produit directement chez le vendeur
  • Rakuten vous rembourse en cas de problème

Gratuit et sans engagement

Félicitations !

Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

En savoir plus

Retour

Horaires

      Note :


      Avis sur Linux System Security - An Administrator's Guide To Open Source Security Tools, 2nd Edition de Krell Mitchell ... - Livre Informatique

      Note : 0 0 avis sur Linux System Security - An Administrator's Guide To Open Source Security Tools, 2nd Edition de Krell Mitchell ... - Livre Informatique

      Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


      Présentation Linux System Security - An Administrator's Guide To Open Source Security Tools, 2nd Edition de Krell Mitchell ...

       - Livre Informatique

      Livre Informatique - Krell Mitchell - 28/11/2002 - Relié

      . .

    • Auteur(s) : Krell Mitchell - Mann Scott - Mitchell Ellen-L
    • Editeur : Pearson
    • Collection : Computer Networking And Distri
    • Parution : 28/11/2002
    • Nombre de pages : 857
    • Expédition : 1470
    • Dimensions : 24 x 18 x 3.8
    • ISBN : 9780130470119



    • Résumé :
      Now, there's an up-to-the-minute, hands-on guide to using open source tools to protect any Linux system! Completely updated for the newest tools and distributions, Linux System Security, Second Edition covers virtually every facet of Linux Security, from firewalls and intrusion detection to authentication and secure Web services. You'll master over a dozen crucial open source Security tools, including sudo, portmap, xinetd, Tiger, tripwire, ipchains, pam, crack, and more. Along the way, three long-time Linux sysadmins will show you the "gotchas," rules of thumb, and undocumented tricks it would take you years to learn on your own! ? Preparing Linux systems for a production environment ? Using Bastille to lock clown Linux systems without unnecessarily compromising their functionality ? Combatting Trojan horses, backdoors, password cracking, buffer overflows, spoofing, DoS, and more ? OpenSSH: eliminating eavesdropping, connection hijacking, and other network-level attacks ? Detecting intrusions with network sniffers and port scanners ? Protecting mixed Linux/UNIX environments ? Understanding Security policies ? Firewalls, email, Web services, filesystems, applications, and much more Want the benefits of Linux without the Security risks? Get Linux System Security, Second Edition!

      Biographie:
      SCOTT MANN is a Linux software engineer at LeftHand Networks in Colorado. He has previously specialized in Linux and UNIX systems for both SGI and Sun Microsystems. His previous Prentice Hall PTR books include Linux TCP/IP Network Administration. ELLEN L. MITCHELL is a Security analyst at Texas A&M University, responsible for campus network Security, development, and administration. She currently maintains the Tiger UNIX Security package. MITCHELL KRELL, Ph.D., is a former university professor turned consultant. He currently travels around the country teaching classes and consulting for various government agencies on a variety of topics, including Linux, IRIX, system administration, networking, Web development, and computer Security.

      Sommaire:
      ["Vulnerability survey","Security policies","Background information","Users, permissions, and filesystems","Pluggable authentication modules","One-time passwords","System accounting","System logging","Superuser do (sudo)","Securing network services: xinetd","The secure shell","Crack","Auditing your system with Bastille","Tripwire","Ipchains","Iptables","Scanners, sniffers, and detectors","Log file management","Implementing and managing security"]

      © Notice établie par DECITRE, libraire

      Le choixNeuf et occasion
      Minimum5% remboursés
      La sécuritéSatisfait ou remboursé
      Le service clientsÀ votre écoute
      LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
      visavisa
      mastercardmastercard
      klarnaklarna
      paypalpaypal
      floafloa
      americanexpressamericanexpress
      Rakuten Logo
      • Rakuten Kobo
      • Rakuten TV
      • Rakuten Viber
      • Rakuten Viki
      • Plus de services
      • À propos de Rakuten
      Rakuten.com