Cargando…

Linux Server security : hack and defend /

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along wit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Binnie, Chris (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, 2016.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn948774688
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 160505s2016 inu o 000 0 eng d
010 |a  2016937233 
040 |a YDXCP  |b eng  |e rda  |e pn  |c YDXCP  |d DG1  |d EBLCP  |d OCLCF  |d INTCL  |d COO  |d UMI  |d YDX  |d DG1  |d RECBK  |d IDB  |d IDEBK  |d TEFOD  |d TEF  |d DEBSZ  |d N$T  |d OCLCQ  |d OCLCO  |d DG1  |d LIP  |d MERUC  |d OCLCQ  |d OCLCO  |d UAB  |d CCO  |d U3W  |d K6U  |d LOA  |d OCLCA  |d COCUF  |d ZCU  |d ICG  |d CNNOR  |d OCLCQ  |d D6H  |d OCLCQ  |d OCLCO  |d OCLCA  |d UUM  |d WRM  |d STF  |d KSU  |d RRP  |d INT  |d VT2  |d WYU  |d OCLCQ  |d OCLCO  |d G3B  |d LVT  |d S8J  |d S9I  |d TKN  |d OCLCQ  |d OCLCO  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d ELBRO  |d OCLCO  |d OCLCQ  |d UKMGB  |d OCLCO  |d OCLCL  |d OCLCQ 
015 |a GBB678935  |2 bnb 
016 7 |a 017846935  |2 Uk 
019 |a 949754761  |a 958923861  |a 959032350  |a 960275872  |a 961309526  |a 964922763  |a 967072295  |a 989416399  |a 1060185091  |a 1066621668  |a 1107372955  |a 1228616069 
020 |a 9781119283096  |q (electronic bk.) 
020 |a 1119283094  |q (electronic bk.) 
020 |a 9781119277644  |q (e-book) 
020 |a 1119277647  |q (e-book) 
020 |a 1119277671 
020 |a 9781119277675 
020 |z 1119277655 
020 |z 9781119277651 
029 1 |a AU@  |b 000057932160 
029 1 |a AU@  |b 000058034653 
029 1 |a CHBIS  |b 010879401 
029 1 |a CHNEW  |b 000884479 
029 1 |a CHNEW  |b 000945364 
029 1 |a CHVBK  |b 480255229 
029 1 |a DEBSZ  |b 480360650 
029 1 |a DEBSZ  |b 485066963 
029 1 |a GBVCP  |b 866470441 
029 1 |a UKMGB  |b 017846935 
035 |a (OCoLC)948774688  |z (OCoLC)949754761  |z (OCoLC)958923861  |z (OCoLC)959032350  |z (OCoLC)960275872  |z (OCoLC)961309526  |z (OCoLC)964922763  |z (OCoLC)967072295  |z (OCoLC)989416399  |z (OCoLC)1060185091  |z (OCoLC)1066621668  |z (OCoLC)1107372955  |z (OCoLC)1228616069 
037 |a 921124  |b MIL 
037 |a 320C3F76-4D1D-4AA8-9509-096BDB4129B3  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 060000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Binnie, Chris,  |e author. 
245 1 0 |a Linux Server security :  |b hack and defend /  |c Chris Binnie. 
264 1 |a Indianapolis, IN :  |b Wiley,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (John Wiley, viewed May 11, 2016). 
520 |a Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. -- from the publisher. 
505 0 |a Introduction -- How This Book Is Organized -- Who Should Read This Book -- Summary -- Chapter 1: Invisibility Cloak -- Background -- Installing knockd -- Some Config Options -- Testing Your Install -- Making Your Server Invisible -- Further Considerations -- Summary -- Chapter 2: Digitally Fingerprint Your Files -- Filesystem Integrity -- Whole Filesystem -- Rootkits -- Configuration -- False Positives -- Well Designed -- Summary -- Chapter 3: Twenty-First-Century Netcat -- History -- Installation Packages -- Transferring Files -- Chaining Commands Together -- Secure Communications -- Executables -- Access Control Lists -- Miscellaneous Options -- Summary -- Chapter 4: Denying Service -- NTP Infrastructure -- NTP Reflection Attacks -- Attack Reporting -- Preventing SNMP Reflection -- DNS Resolvers -- Complicity -- Bringing a Nation to Its Knees -- Mapping Attacks -- Summary -- Chapter 5: Nping -- Functionality -- TCP -- Interpreter -- UDP -- ICMP -- ARP -- Payload Options -- Echo Mode -- Other Nping Options -- Summary -- Chapter 6: Logging Reconnoiters -- ICMP Misconceptions -- tcpdump -- Iptables -- Multipart Rules -- Log Everything for Forensic Analysis -- Hardening -- Summary -- Chapter 7: Nmap's Prodigious NSE -- Basic Port Scanning -- The Nmap Scripting Engine -- Timing Templates -- Categorizing Scripts -- Contributing Factors -- Security Holes -- Authentication Checks -- Discovery -- Updating Scripts -- Script Type -- Regular Expressions -- Graphical User Interfaces -- Zenmap -- Summary -- Chapter 8: Malware Detection -- Getting Started -- Configuration -- Summary -- Chapter 9: Password Cracking with Hashcat -- History -- Understanding Passwords -- Using Hashcat -- Running Hashcat -- oclHashcat -- Hashcat-Utils -- Summary -- Chapter 10: SQL Injection Attacks -- History -- Basic SQLi -- Mitigating SQLi in PHP -- Exploiting SQL Flaws. 
505 8 |a Launching an Attack -- Trying SQLi Legally -- Summary -- End User License Agreement. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Linux. 
630 0 7 |a Linux  |2 fast 
650 0 |a Computer security. 
650 0 |a Client/server computing. 
650 0 |a Web servers. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Architecture client-serveur (Informatique) 
650 6 |a Serveurs Web. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Client/server computing  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Web servers  |2 fast 
758 |i has work:  |a Linux Server security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGbDF9gDdR3b9kHFYMgPHC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Binnie, Chris.  |t Linux Server security.  |d Indianapolis, IN : Wiley, 2016  |z 1119277655  |z 9781119277651  |w (OCoLC)936344734 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4519259  |z Texto completo 
938 |a eLibro  |b ELBO  |n ELB177325 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30446618 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29996753 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4519259 
938 |a EBSCOhost  |b EBSC  |n 1233764 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis33662032 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00681448 
938 |a YBP Library Services  |b YANK  |n 12979691 
938 |a YBP Library Services  |b YANK  |n 12976388 
994 |a 92  |b IZTAP