Safeguard your systems from all types of hackers, hijackers, and predators with help from this insightful resource. Get thorough, just-the-facts coverage of Linux, UNIX and Solaris, and learn about advanced hacking techniques including buffer overflows, password theory, port re-direction, and more.
"synopsis" may belong to another edition of this title.
Nitesh Dhanjani (Belleview, WA) is an information systems security consultant for Foundstone. He has had over 6 years of experience with system administration and information security. Prior to joining Foundstone's team, Nitesh was involved with the development of various Linux loadable kernel modules. He continues to be active with systems programming. Nitesh has also worked with Ernst & Young LLP where he performed various attack and penetration reviews for many significant companies in the IT arena. Nitesh graduated from Purdue University with both a Bachelors and Masters in Computer Science. While at Purdue, he was involved in numerous research projects with the CERIAS(Center for Education and Research in Information Assurance and Security) team. He also helped teach C and C++ courses. Mike Horton (Seattle, WA), series editor for the HackNotes[trademark] series, is an information systems security consultant for Foundstone, with an emphasis on secure system design, security architecture, operational security and ethical hacking. Prior to joining Foundstone, Mike was the Founder and Chief Technology Architect for Mercury Prime, a provider of secure real-time communication software. Previously, Mike was a senior consultant with Ernst & Young LLP where he was responsible for their ethical hacking and security architecture solutions services. Mike has performed numerous ethical hacking exercises for many significant companies in the IT and business arenas.From the Back Cover:
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!
"About this title" may belong to another edition of this title.
Book Description McGraw-Hill Osborne Media, 2003. Paperback. Book Condition: New. 1. Bookseller Inventory # DADAX0072227869
Book Description McGraw-Hill Osborne Media, 2003. Paperback. Book Condition: New. New item. Bookseller Inventory # QX-132-96-0558000