Completely updated and revised to cover the latest Linux security vulnerabilities and tools, this book provides details about brand-new Linux attacks, counter measures and case studies.
"synopsis" may belong to another edition of this title.
Linux, like every other networkable OS, is vulnerable to a variety of local and remote attacks. Hacking Linux Exposed seeks to do two jobs: explain where the vulnerabilities lie and provide ways to minimise or eliminate the risks.
The authors' slightly breathless hands-on approach--coupled with the wealth of relevant technical detail--produces an unusually pacey read. Much of the spiciness comes from the emphasis on exploiting Linux's weaknesses. This is helped with lots of case studies of successful intrusions. You won't be in any doubt that you should be taking security seriously.
Much of the advice is common sense: use secure passwords, shadow password files, turn off unwanted services, set up an efficient firewall, apply security patches and so on. But the devil is in the detail. Successfully hardening a Linux system is non-trivial (as with other OS's). It's also an ongoing process. What really sets Hacking Linux Exposed apart is the way it walks you through each vulnerability and then explains the technical aspects of implementing a defense against it--converting to shadow password files, setting up IPChains, automating log file checking, testing your own security and more are all detailed.
Linux sysadmins will love this book. However, any Linux user with the confidence to edit a configuration file and a copy of Hacking Linux Exposed to hand can also have the hardest machine on the block. --Steve Patient
"A comprehensive overview of Linux security in the popular Hacking-Exposed style. -- (Rain Forest Puppy (RFP), web server security authority and discoverer of the IIS MSADC vulnerability)
"Hacking Linux Exposed covers tried and true techniques to cutting-edge hacks and everything in between. If you are serious about Linux and security, buy this book. Period." -- Simple Nomad, author of The Hack FAQ and Pandora
"Hacking Linux Exposed is a highly organized and modular book that teaches the reader what to do before, during, and after an incident. It consolidates years of security administration experience into a single reference guide. It illustrates a procedure for securing a new installation, shows the reader how to recover from a break-in on an existing machine and presents a methodology for ongoing monitoring. Each chapter contains well-illustrated examples from real installations along with real solutions. Hacking Linux Exposed has taken a complex subject and broken it down into a format as useful for front-line Linux users as for corporate IT managers." -- Allen Leibowitz, CEO Anzen Computing, Inc. & Developer of the Anzen Flight Jacket Intrusion Detection System
"Knowing how attackers work and how a system can be broken into is the key to preventing unwanted break-ins. Hacking Linux Exposed strips away the 'black magic' image of hacking and sheds light on the prevention techniques that protect Linux systems from the ravages of attackers. This security book is a valuable asset for Linux administrators. You may find it frequently borrowed by fellow members of your staff and difficult to keep on your bookshelf." -- Christopher Klaus, Founder & Chief Technology Officer, Internet Security Systems -ISS
"The rapidly expanding number of Linux machines on our campus combined with the open network of a university makes us an ideal target for hackers. The full disclosure policy of Hacking Linux Exposed allows security professionals and others who are interested in maintaining the security of their systems to observe how hackers penetrate a system and how to raise the bar to counter the attacks. If the sysadmins on our campus take advantage of this book, they will save themselves and our security team hours of work recovering from break-ins." -- Bob Bartlett, Assistant Director, Network Security & Enterprise, Network Server Administration of the University of Chicago, Illinois
"About this title" may belong to another edition of this title.
FREE shipping within U.S.A.
Destination, rates & speedsSeller: Goodwill of Colorado, COLORADO SPRINGS, CO, U.S.A.
Condition: VeryGood. This item shows limited signs of wear overall with minor scuffs or cosmetic blemishes. No curled corners, bent covers or damage to dust jackets. No highlighting/ writing in pages. Digital codes may not be included and have not been tested to be redeemable and/or active. Please note that all items are donated goods and are in used condition. Orders shipped Monday through Friday! Your purchase helps put people to work and learn life skills to reach their full potential. Orders shipped Monday through Friday. Your purchase helps put people to work and learn life skills to reach their full potential. Thank you! Seller Inventory # 466SUS002FDQ
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 2nd. Used book that is in clean, average condition without any missing pages. Seller Inventory # 4100479-6
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. 2nd. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 5556561-6
Quantity: 1 available
Seller: Better World Books: West, Reno, NV, U.S.A.
Condition: Good. 2nd. Used book that is in clean, average condition without any missing pages. Seller Inventory # 4100479-6
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Good. 2nd. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Seller Inventory # GRP17521135
Quantity: 1 available
Seller: clickgoodwillbooks, Indianapolis, IN, U.S.A.
Condition: Acceptable. This is a paper back book: Used - Acceptable: All pages and the cover are intact, but shrink wrap, dust covers, or boxed set case may be missing. Pages may include limited notes, highlighting, or minor water damage but the text is readable. Item may be missing bundled media. Seller Inventory # 3O6SAJ0000FW
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 2.75. Seller Inventory # G0072225645I2N00
Quantity: 1 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.75. Seller Inventory # G0072225645I4N00
Quantity: 1 available
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condition: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.75. Seller Inventory # G0072225645I4N00
Quantity: 1 available
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Paperback. Condition: Very Good. Completely updated and revised to cover the latest Linux security vulnerabilities and tools, this book provides details about brand-new Linux attacks, counter measures and case studies. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Seller Inventory # GOR002489109
Quantity: 2 available