Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
The Latest Linux Security Solutions
This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
ISECOM (the Institute for Security and Open Methodologies), (Barcelona, Spain & New York, NY) is an open, collaborative, security research community established in January 2001. In order to fulfill its mission focus to apply critical thinking and scientific methodology to all facets of security, ISECOM is chartered as a commercial-free and non-partisan organization. The ISECOM Board of Directors reflects many countries representing thousands of members and volunteers from around the world. In a world of increasing commercial and industrial misrepresentation of security, ISECOM enables logical and rational decision-making in all aspects of security, integrity, privacy, and safety.
Foreword
Acknowledgments
Introduction
Part I: Security and Controls
Chapter 1. Applying Security
Chapter 2. Applying Interactive Controls
Chapter 3. Applying Process Controls
Part II: Hacking the System
Chapter 4. Local Access Control
Chapter 5. Data Networks Security
Chapter 6. Unconventional Data Attack Vectors
Chapter 7. Voice over IP
Chapter 8. Wireless Networks
Chapter 9. Input/Output Devices
Chapter 10. RFID--Radio Frequency Identification
Chapter 11. Emanation Attacks
Chapter 12. Trusted Computing
Part III: Hacking the Users
Chapter 13. Web Application Hacking
Chapter 14. Mail Services
Chapter 15. Name Services
Part IV: Care and Maintenance
Chapter 16. Reliability: Static Analysis of C Code
Chapter 17. Security Tweaks in the Linux Kernal
Part V: Appendixes
Appendix A. Management and Maintenance
Appendix B. Linux Forensics and Data Recovery
Appendix C. BSD
Index
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
GRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiEUR 2,36 per la spedizione in U.S.A.
Destinazione, tempi e costiDa: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condizione: Good. 3. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Codice articolo 0072262575-11-1
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_373556533
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.4. Codice articolo G0072262575I3N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 2.4. Codice articolo G0072262575I4N00
Quantità: 1 disponibili
Da: savehere619, San Diego, CA, U.S.A.
Condizione: good. Codice articolo SHM.5LTS
Quantità: 1 disponibili
Da: Goodwill of Colorado, COLORADO SPRINGS, CO, U.S.A.
Condizione: Good. This item is in overall good condition. Covers and dust jackets are intact but may have minor wear including slight curls or bends to corners as well as cosmetic blemishes including stickers. Pages are intact but may have minor highlighting/ writing. Binding is intact; however, spine may have slight wear overall. Digital codes may not be included and have not been tested to be redeemable and/or active. Minor shelf wear overall. Please note that all items are donated goods and are in used condition. Orders shipped Monday through Friday! Your purchase helps put people to work and learn life skills to reach their full potential. Orders shipped Monday through Friday. Your purchase helps put people to work and learn life skills to reach their full potential. Thank you! Codice articolo 466M6D000BO2
Quantità: 1 disponibili
Da: Patrico Books, Apollo Beach, FL, U.S.A.
Paperback. Condizione: Good. Ships Out Tomorrow! Codice articolo 220225056
Quantità: 1 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Paperback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Codice articolo GOR007225257
Quantità: 1 disponibili
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New. Codice articolo 4103302-n
Quantità: Più di 20 disponibili
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
Paperback or Softback. Condizione: New. Hacking Exposed Linux: Linux Security Secrets and Solutions 2.33. Book. Codice articolo BBS-9780072262575
Quantità: 5 disponibili