Tighten holes and maintain security on your Linux system! From one of the authors of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes a must-have security handbook for anyone running Linux. This cutting-edge volume shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them.
"synopsis" may belong to another edition of this title.
This guide aims to provide systems administrators with insights into how to find and exploit security holes in Linux - and how they can be fixed. It covers vulnerabilities found on common Linux distributions, for example, Red Hat and SuSE.Review:
Linux, like every other networkable OS, is vulnerable to a variety of local and remote attacks. Hacking Linux Exposed seeks to do two jobs: explain where the vulnerabilities lie and provide ways to minimise or eliminate the risks.
The authors' slightly breathless hands-on approach--coupled with the wealth of relevant technical detail--produces an unusually pacey read. Much of the spiciness comes from the emphasis on exploiting Linux's weaknesses. This is helped with lots of case studies of successful intrusions. You won't be in any doubt that you should be taking security seriously.
Much of the advice is common sense: use secure passwords, shadow password files, turn off unwanted services, set up an efficient firewall, apply security patches and so on. But the devil is in the detail. Successfully hardening a Linux system is non-trivial (as with other OS's). It's also an ongoing process. What really sets Hacking Linux Exposed apart is the way it walks you through each vulnerability and then explains the technical aspects of implementing a defense against it--converting to shadow password files, setting up IPChains, automating log file checking, testing your own security and more are all detailed.
Linux sysadmins will love this book. However, any Linux user with the confidence to edit a configuration file and a copy of Hacking Linux Exposed to hand can also have the hardest machine on the block. --Steve Patient
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Professional, 2001. Paperback. Book Condition: New. book. Bookseller Inventory # 0072127732
Book Description McGraw-Hill Professional, 2001. Paperback. Book Condition: New. Bookseller Inventory # DADAX0072127732
Book Description McGraw-Hill Professional, 2001. Paperback. Book Condition: New. Bookseller Inventory # P110072127732
Book Description Osborne/McGraw-Hill, 2001. Paperback. Book Condition: Brand New. 1st edition. 566 pages. 9.08x7.42x1.36 inches. In Stock. Bookseller Inventory # zk0072127732
Book Description McGraw-Hill Professional. PAPERBACK. Book Condition: New. 0072127732 New Condition. Bookseller Inventory # NEW6.0030000
Book Description The McGraw-Hill Company. Book Condition: New. pp. 566. Bookseller Inventory # 5776847
Book Description McGraw-Hill Professional, 2001. Book Condition: new. Shiny and new! Expect delivery in 2-3 weeks. Bookseller Inventory # 9780072127737-1
Book Description Book Condition: Brand New. Book Condition: Brand New. Bookseller Inventory # 97800721277371.0