Master x86 assembly language from the Linux point of view! Assembly language lies at the boundary between hardware and software. While it can be described purely in terms of how it controls hardware, many of its features only make sense in the context of operating systems and programming languages.
Real World Linux Security (Prentice Hall Ptr Open Source Technology Series)
โ Scribed by Bob Toxen
- Publisher
- Prentice Hall
- Year
- 2002
- Tongue
- English
- Leaves
- 848
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Stop today's most vicious Internet attackers-right in their tracks!Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks-and arm you with breakthrough resources for protecting yourself! Surprising new IP Tables research every netadmin must know about New techniques and software for detecting and blocking ARP and Switch attacks Important enhancements to Linux-based adaptive firewalls Thoroughly revised coverage of Samba security for Windows clients802.11b wireless networks security How to make the most of Logcheck, Portsentry, and other new monitoring tools VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more Includes all-new chapter on physical security Reviewed by some of the world's leading Linux security experts!
๐ SIMILAR VOLUMES
Master x86 assembly language from the Linux point of view! Assembly language lies at the boundary between hardware and software. While it can be described purely in terms of how it controls hardware, many of its features only make sense in the context of operating systems and programming languages.
Anyone who's done programming work knows that you spend half your coding time looking for other people's solutions to the problems you're facing in your project. Particularly when you're dealing with times, dates, standard calculations, and other common problems, you find yourself saying, "Someone m
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff" their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest" open source s
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the
Don't waste your money on this book, unless you want to go back to older versions of Linux... Many of the links are gone, many of the programs don't work with the newer versions of Linux (post 2004), and buying this book in September 2005 was basically flushing nearly $50 down the toilet...