Personnaliser

OK

Real World Linux Security - Intrusion Prevention, Detection, And Recovery, 2nd Edition, Cd-Rom Included - Toxen Bob

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

Prix neuf 58,10 €

-87%

Qu'est-ce que le prix barré ?

C'est le prix de vente au public, fixé par l'éditeur ou l'importateur, pour le même article neuf.

En savoir plus

7,00 €

Occasion · Comme Neuf

  • Livraison : 4,19 €
Voir les modes de livraison

Très bon livre sur la sécurité, couvre tout depuis la sécurisation de son OS à comment récupérer son système après une attaque

Publicité
 
Vous avez choisi le retrait chez le vendeur à
  • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
  • Récupérez le produit directement chez le vendeur
  • Rakuten vous rembourse en cas de problème

Gratuit et sans engagement

Félicitations !

Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

En savoir plus

Retour

Horaires

      Note :


      Avis sur Real World Linux Security - Intrusion Prevention, Detection, And Recovery, 2nd Edition, Cd - Rom Included de Toxen... - Livre Informatique

      Note : 0 0 avis sur Real World Linux Security - Intrusion Prevention, Detection, And Recovery, 2nd Edition, Cd - Rom Included de Toxen... - Livre Informatique

      Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


      Présentation Real World Linux Security - Intrusion Prevention, Detection, And Recovery, 2nd Edition, Cd - Rom Included de Toxen...

       - Livre Informatique

      Livre Informatique - Toxen Bob - 06/02/2003 - Broché

      . .

    • Auteur(s) : Toxen Bob
    • Editeur : Pearson
    • Collection : Open Source Technology Series
    • Parution : 06/02/2003
    • Format : Petit, de 0 à 350g
    • Nombre de pages : 840
    • Nombre de livres : 1
    • Expédition : 1205
    • Dimensions : 23.5 x 18 x 2.8
    • ISBN : 0130464562



    • Résumé :
      Stop today's most vicious Internet attackers-right in their tracks! Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks-and arm you with breakthrough resources for protecting yourself! Surprising new IP Tables research every netadmin must know about. New techniques and software for detecting and blocking ARP and Switch attacks. Important enhancements to Linux-based adaptive firewalls. Thoroughly revised coverage of Samba security for Windows clients. 802.11b wireless networks security. How to make the most of Logcheck, Portsentry, and other new monitoring tools. VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more. Includes all-new chapter on physical security. Reviewed by some of the world's leading Linux security experts!

      Biographie:
      BOB TOXEN has 28 years of UNIX/Linux experience. One of the 162 recognized developers of Berkeley UNIX, he learned about security as a student at UC Berkeley, where he cracked several of the original UNIX systems there. He is now President of Fly-By-Day Consulting, specializing in Linux and network security, firewalls, VPNs, 24/7 network monitoring, response, and administration for clients worldwide. In 2002, his recommendations were included in a report on improving U.S. intelligence that was presented to President Bush at the President's request. Toxen currently works with the U.S. Centers for Disease Control and Prevention to combat bioterrorism.

      Sommaire:
      ["SECURING YOUR SYSTEM","Quick fixes for common problems","Quick and easy hacking and how to avoid it","Common hacking by subsystem","Common hacker attacks","Advanced security issues","Establishing security policies","Trusting other computers","Gutsy break-ins","Case studies","Recent break-ins","PREPARING FOR AN INTRUSION","Hardening your system","Preparing your hardware","Preparing your configuration","Scanning your own system","DETECTING AN INTRUSION","Monitoring activity","Scanning your system for anomalies","RECOVERING FROM AN INTRUSION","Regaining control of your system","Finding and repairing the damage","Finding the attacker's system","Having the cracker crack rocks"]

      © Notice établie par DECITRE, libraire