| | | | • | Table of Contents | • | Examples |
| Real World Linux® Security: Intrusion Prevention, Detection, and Recovery, Second Edition | By Bob Toxen | | | Publisher | : Prentice Hall PTR | Pub Date | : November 13, 2002 | ISBN | : 0-13-046456-2 | Pages | : 848 | Slots | : 1 | | |
"You have in your hands a book I've been waiting to read for years a practical, hands-on guide to hardening your Linux system." From the foreword by Eric S. Raymond Safeguard your Linux systems against today's most vicious attacks! Realistic, step-by-step techniques from one of the world's leading Linux security experts Covers IP Tables, ARP attacks, adaptive firewalls, VPNs, wireless networks, Samba, monitoring, 2.4 kernel security, and much more Quick and effective recovery from intrusions CD-ROM contains important new tools for monitoring networks and locking out hackers "A comprehensive guide to system security: covers everything from hardening a system to system recovery after an attack." Steve Bourne, Creator of the Bourne Shell Stop today's most vicious Internet attackers right in their tracks! Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks and arm you with breakthrough resources for protecting yourself! Surprising new IP Tables research every netadmin must know about New techniques and software for detecting and blocking ARP and Switch attacks Important enhancements to Linux-based adaptive firewalls Thoroughly revised coverage of Samba security for Windows clients 802.11b wireless networks security How to make the most of Logcheck, Portsentry, and other new monitoring tools VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more Includes all-new chapter on physical security Reviewed by some of the world's leading Linux security experts! |