The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a
How to Cheat at Securing Linux
โ Scribed by James Stanger
- Book ID
- 127449186
- Publisher
- Syngress
- Year
- 2007
- Tongue
- English
- Weight
- 10 MB
- Edition
- Pap/Psc
- Category
- Library
- ISBN
- 0080558682
No coin nor oath required. For personal study only.
โฆ Synopsis
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. But this was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact OPPOSITE story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers.
๐ SIMILAR VOLUMES
Written for managers responsible for IT/Security departments from mall office environments to enterprise networks, this text is designed to cover the basic concepts of security, non-technical principle and practices of security, and basic information about the technical details of many of the produc
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons ava