This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, ho This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic
Hacking Linux Exposed: Linux Security Secrets & Solutions
This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, ho This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic
Compare
Tarek –
Le livre est un peu ancien, plus de 10 ans. Il constitue, en son temps, un guide pratique pour sécuriser un système Linux. Avec le recul, ce genre de livres anciens ne mérite pas une lecture minutieuse mais un survol très rapide. La preuve, j'ai pris 50 jours pour le finir !!! Le livre est un peu ancien, plus de 10 ans. Il constitue, en son temps, un guide pratique pour sécuriser un système Linux. Avec le recul, ce genre de livres anciens ne mérite pas une lecture minutieuse mais un survol très rapide. La preuve, j'ai pris 50 jours pour le finir !!!
Ari Suradipraja –
Excellent
Edward –
This is an excellent introduction to Linux security. If you manage a Linux server you need to read this. Or pay SANS $3,000.
James –
Tata Subranta –
John –
Taoufix –
Evelyn Dickinson –
Fero –
Boyd Webb –
Hamid –
Victoria –
Stephanie Reid –
Doug Stevens –
LainCraft –
Invoker –
Gene –
Yao –
海龍 –
Eric Lamb –
Kaiser –
Dan –
Michal Zuber –
Craig Henry –
Bogdan Kulbida –
Petro Dudi –
Virangar –
Hàśšăņ Śhâhîđ –
Joseph II –
Josh –