Flylib.com
Index_D
Previous page
Table of content
Next page
D
daemons, 32-33
decryption, 158-159
CFS, 161-167
OpenSSL, 159-161
See also
cryptography; encryption
dependencies
services, 27-32
software, 86-89
directories
chroot directory structure, 188-198
per- user temporary directories, 179
SUID/SGID, 139-140
temporary, 138-139
disaster recovery, 106
documenting server changes, 107
Previous page
Table of content
Next page
Hardening Linux
ISBN: 0072254971
EAN: 2147483647
Year: 2004
Pages: 113
Authors:
John Terpstra
,
Paul Love
,
Ronald P. Reck
,
Tim Scanlon
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Summary
Introduction
Message Queue Control
Introduction
C.2. RPC Definitions
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
Inside Network Security Assessment: Guarding Your IT Infrastructure
Understanding the IT Security Process
The Goals and Objectives of a Risk Assessment
Performing the Assessment
Determining What Tools to Use
SIRT Incident Report
Mastering Delphi 7
Building the User Interface
Modeling and OOP Programming (with ModelMaker)
Writing Database Components
Reporting with Rave
Web Programming with WebBroker and WebSnap
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 6. Use Your Treo as a Modem
Hack 10. Control XMMS with Bluetooth
Hack 25. Detect Networks with Handheld PCs
Hack 29. Detect Networks with Kismet
Section A.6. Bluetooth: Cable Replacement for Devices
Extending and Embedding PHP
Starting Up and Shutting Down
The Other refcounter
Declaring and Accessing INI Settings
Overriding INI_SYSTEM and INI_PERDIR Options
Appendix B. PHPAPI
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies