Linux System Security - An Administrator's Guide To Open Source Security Tools, 2nd Edition - Krell Mitchell
- Collection: Computer Networking And Distri
- Format: Relié Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtreSoyez informé(e) par e-mail dès l'arrivée de cet article
Créer une alerte prix- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Linux System Security - An Administrator's Guide To Open Source Security Tools, 2nd Edition de Krell Mitchell ... - Livre Informatique
0 avis sur Linux System Security - An Administrator's Guide To Open Source Security Tools, 2nd Edition de Krell Mitchell ... - Livre Informatique
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
Présentation Linux System Security - An Administrator's Guide To Open Source Security Tools, 2nd Edition de Krell Mitchell ...
- Livre Informatique
Résumé :
Now, there's an up-to-the-minute, hands-on guide to using open source tools to protect any Linux system! Completely updated for the newest tools and distributions, Linux System Security, Second Edition covers virtually every facet of Linux Security, from firewalls and intrusion detection to authentication and secure Web services. You'll master over a dozen crucial open source Security tools, including sudo, portmap, xinetd, Tiger, tripwire, ipchains, pam, crack, and more. Along the way, three long-time Linux sysadmins will show you the "gotchas," rules of thumb, and undocumented tricks it would take you years to learn on your own! ? Preparing Linux systems for a production environment ? Using Bastille to lock clown Linux systems without unnecessarily compromising their functionality ? Combatting Trojan horses, backdoors, password cracking, buffer overflows, spoofing, DoS, and more ? OpenSSH: eliminating eavesdropping, connection hijacking, and other network-level attacks ? Detecting intrusions with network sniffers and port scanners ? Protecting mixed Linux/UNIX environments ? Understanding Security policies ? Firewalls, email, Web services, filesystems, applications, and much more Want the benefits of Linux without the Security risks? Get Linux System Security, Second Edition!
Biographie:
SCOTT MANN is a Linux software engineer at LeftHand Networks in Colorado. He has previously specialized in Linux and UNIX systems for both SGI and Sun Microsystems. His previous Prentice Hall PTR books include Linux TCP/IP Network Administration. ELLEN L. MITCHELL is a Security analyst at Texas A&M University, responsible for campus network Security, development, and administration. She currently maintains the Tiger UNIX Security package. MITCHELL KRELL, Ph.D., is a former university professor turned consultant. He currently travels around the country teaching classes and consulting for various government agencies on a variety of topics, including Linux, IRIX, system administration, networking, Web development, and computer Security.
Sommaire:
["Vulnerability survey","Security policies","Background information","Users, permissions, and filesystems","Pluggable authentication modules","One-time passwords","System accounting","System logging","Superuser do (sudo)","Securing network services: xinetd","The secure shell","Crack","Auditing your system with Bastille","Tripwire","Ipchains","Iptables","Scanners, sniffers, and detectors","Log file management","Implementing and managing security"]
©