๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Real World Linux Security (Prentice Hall Ptr Open Source Technology Series)

โœ Scribed by Bob Toxen


Publisher
Prentice Hall
Year
2002
Tongue
English
Leaves
848
Edition
2
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Stop today's most vicious Internet attackers-right in their tracks!Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks-and arm you with breakthrough resources for protecting yourself! Surprising new IP Tables research every netadmin must know about New techniques and software for detecting and blocking ARP and Switch attacks Important enhancements to Linux-based adaptive firewalls Thoroughly revised coverage of Samba security for Windows clients802.11b wireless networks security How to make the most of Logcheck, Portsentry, and other new monitoring tools VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more Includes all-new chapter on physical security Reviewed by some of the world's leading Linux security experts!


๐Ÿ“œ SIMILAR VOLUMES


Linux Assembly Language Programming (Ope
โœ Bob Neveln ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› Prentice Hall ๐ŸŒ English

Master x86 assembly language from the Linux point of view! Assembly language lies at the boundary between hardware and software. While it can be described purely in terms of how it controls hardware, many of its features only make sense in the context of operating systems and programming languages.

Linux Assembly Language Programming (Ope
โœ Bob Neveln ๐Ÿ“‚ Library ๐Ÿ“… 2000 ๐Ÿ› Prentice Hall ๐ŸŒ English

Master x86 assembly language from the Linux point of view! Assembly language lies at the boundary between hardware and software. While it can be described purely in terms of how it controls hardware, many of its features only make sense in the context of operating systems and programming languages.

Linux Programming by Example: The Fundam
โœ Arnold Robbins ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐ŸŒ English

Anyone who's done programming work knows that you spend half your coding time looking for other people's solutions to the problems you're facing in your project. Particularly when you're dealing with times, dates, standard calculations, and other common problems, you find yourself saying, "Someone m

Nessus, Snort, & Ethereal Power Tools: C
โœ Neil Archibald, Gilbert Ramirez, Noam Rathaus ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› Syngress ๐ŸŒ English

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff" their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest" open source s

SELinux: NSA's Open Source Security Enha
โœ Bill McCarty ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› O'Reilly Media ๐ŸŒ English

The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the

Hack Proofing Linux : A Guide to Open So
โœ James Stanger, Patrick T. Lane ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Syngress ๐ŸŒ English

Don't waste your money on this book, unless you want to go back to older versions of Linux... Many of the links are gone, many of the programs don't work with the newer versions of Linux (post 2004), and buying this book in September 2005 was basically flushing nearly $50 down the toilet...