|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn162719059 |
003 |
OCoLC |
005 |
20231117015040.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
070806s2001 mau o 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OCLCQ
|d OCLCF
|d VVN
|d DEBSZ
|d YDXCP
|d ZCU
|d U5D
|d B24X7
|d MERUC
|d CNNAI
|d OCLCQ
|d LIV
|d OCLCA
|d D6H
|d COO
|d LEAUB
|d OL$
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 48846009
|a 51486618
|a 54829671
|a 507200974
|a 606016699
|a 858422653
|
020 |
|
|
|a 9781928994343
|q (paperback)
|
020 |
|
|
|a 1928994342
|q (paperback)
|
035 |
|
|
|a (OCoLC)162719059
|z (OCoLC)48846009
|z (OCoLC)51486618
|z (OCoLC)54829671
|z (OCoLC)507200974
|z (OCoLC)606016699
|z (OCoLC)858422653
|
050 |
|
4 |
|a QA76.9.A25
|b S73 2001eb
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Stanger, James.
|
245 |
1 |
0 |
|a Hack proofing Linux :
|b a guide to open source security /
|c James Stanger.
|
260 |
|
|
|a Rockland, Mass. :
|b Syngress Media ;
|a London :
|b International Thomson,
|c 2001.
|
300 |
|
|
|a 1 online resource (528 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a 1928994342.pdf; 1928994342.pdf; Cover; Table of Contents; Preface; Chapter 1 Introduction to Open Source Security; Chapter 2 Hardening the Operating System; Chapter 3 System Scanning and Probing; Chapter 4 Implementing an Intrusion Detection System; Chapter 5 Troubleshooting the Network with Sniffers; Chapter 6 Network Authentication and Encryption; Chapter 7 Avoiding Sniffing Attacks through Encryption; Chapter 8 Creating Virtual Private Networks; Chapter 9 Implementing a Firewall with Ipchains and Iptables; Chapter 10 Deploying the Squid Web Proxy Cache Server.
|
630 |
0 |
0 |
|a Linux.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
630 |
0 |
7 |
|a Linux
|2 fast
|0 (OCoLC)fst01382136
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Stanger, James.
|t Hack proofing Linux.
|d Rockland, Mass. : Syngress Media ; London : International Thomson, 2001
|z 1928994342
|z 9781928994343
|w (OCoLC)48677633
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781928994343
|z Texto completo
|