๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Securing & Optimizing Linux: The Hacking Solution

โœ Scribed by Gerhard Mourani


Publisher
Open Network Architecture
Year
2002
Tongue
English
Leaves
1101
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Securing & Optimizing Linux: The Hacking
โœ Gerhard Mourani ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Open Network Architecture ๐ŸŒ English

This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux

Hacking Linux exposed: Linux security se
โœ Brian Hatch ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Osborne/McGraw-Hill ๐ŸŒ English

If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box?

Linux Hacking Exposed: Linux Security Se
โœ Brian Hatch ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English

This guide aims to provide systems administrators with insights into how to find and exploit security holes in Linux - and how they can be fixed. It covers vulnerabilities found on common Linux distributions, for example, Red Hat and SuSE.