It's not a question of "if" but "when." Will you be ready to protect your system when a cracker comes? Real World Linux Security goes beyond the books that merely detail system vulnerabilities by offering system administrators practical solutions for safeguarding Linux systems and actively responding to break-in attempts. Veteran Bob Toxen shows you how to know your enemies and stop them at the front gate, before they can damage your system. The book is organized into four sections: securing your system, preparing for an intrusion, detecting an intrusion, and recovering from an intrusion. Toxen even provides at-a-glance icons and tables rating the severity and likelihood of each type of attack. Along the way, you'll learn how to configure systems so they alter themselves to lock out a cracker -- and notify the sysadmin immediately -- at the first sign of attack. You'll discover virtually cracker-proof techniques for protecting credit card databases, even if your web server and network are compromised. Toxen also presents techniques for ensuring that, if a break-in does occur, damage will be minimal and a full recovery can happen fast. This fully updated Second Edition now covers IP tables, home, mobile, and wireless issues, and protecting your network from users as well as crackers.
"synopsis" may belong to another edition of this title.
―From the foreword by Eric S. Raymond
―Steve Bourne, Creator of the Bourne Shell
Stop today's most vicious Internet attackers―right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks―and arm you with breakthrough resources for protecting yourself!
The accompanying web site contains the author's own state-of-the-art software for instantly locking out hackers and alerting system administrators. The website contents also include exclusive IP Tables and IP Chains firewall scripts (rule sets), as well as powerful new tools for monitoring network health, detecting and reporting suspicious activities, securing backups, simplifying recovery, and much more.
"About this title" may belong to another edition of this title.
Shipping:
£ 3.21
Within U.S.A.
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0130464562
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0130464562
Book Description Paperback. Condition: New. Seller Inventory # Abebooks16095
Book Description Condition: New. New. In shrink wrap. Looks like an interesting title! 2.73. Seller Inventory # Q-0130464562