Maximum Linux Security

Maximum Linux Security
Title Maximum Linux Security PDF eBook
Author Anonymous
Publisher Sams Publishing
Pages 772
Release 2000
Genre Computers
ISBN 9780672316708

Download Maximum Linux Security Book in PDF, Epub and Kindle

A controversial, comprehensive guide to Linux security--written by the same anonymous hacker who wrote the bestselling "Maximum Security." The book covers hundreds of Linux system holes, attack methods, hacker's tools, and security techniques. The CD-ROM includes a comprehensive collection of Linux security products, plus code examples, technical documents,

Maximum Security

Maximum Security
Title Maximum Security PDF eBook
Author Anonymous
Publisher Sams Publishing
Pages 981
Release 2003
Genre Computers
ISBN 0672324598

Download Maximum Security Book in PDF, Epub and Kindle

Security issues are at an all-time high. This volume provides updated, comprehensive, platform-by-platform coverage of security issues, and includes to-the-point descriptions of techniques hackers use to penetrate systems. This book provides information for security administrators interested in computer and network security and provides techniques to protect their systems.

Linux Security

Linux Security
Title Linux Security PDF eBook
Author Ramón J. Hontañón
Publisher John Wiley & Sons
Pages 511
Release 2006-02-20
Genre Computers
ISBN 0782153275

Download Linux Security Book in PDF, Epub and Kindle

Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threats of all kinds. Hundreds of clear, consistent examples illustrate these techniques in detail†so you stay on track and accomplish all your goals. Coverage includes: Understanding information and system security procedures Developing a corporate security policy Designing and deploying an effective system and network monitoring strategy Managing the network services offered by Linux servers Understanding Sendmail security, including authentication and privacy Providing application-level mail security using PGP Designing and deploying an Apache HTTP server, including SSL extensions Securing your Samba server Building a network layer firewall using IPtables and Linux kernel v.2.4 Using the NEC SOCKS5 transport layer firewall Deploying the TIS firewall toolkit Offering secure remote connectivity with IPsec and PPTP VPNs Adding strong user authentication to Linux servers using Kerberos Understanding the Linux Pluggable Authentication Modules (PAM)

Linux Security Cookbook

Linux Security Cookbook
Title Linux Security Cookbook PDF eBook
Author Daniel J. Barrett
Publisher "O'Reilly Media, Inc."
Pages 335
Release 2003-06-02
Genre Computers
ISBN 1449366767

Download Linux Security Cookbook Book in PDF, Epub and Kindle

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.

Maximum Windows 2000 Security

Maximum Windows 2000 Security
Title Maximum Windows 2000 Security PDF eBook
Author Mark Burnett
Publisher Sams Publishing
Pages 626
Release 2002
Genre Computers
ISBN 9780672319655

Download Maximum Windows 2000 Security Book in PDF, Epub and Kindle

Written from the hacker's perspective,Maximum Windows 2000 Securityis a comprehensive, solutions-oriented guide to Windows 2000 security.Topics include: Physical & File System Security, Password Security, Malicious Code, Windows 2000 Network Security Architecture and Professional Protocols, Web Server Security, Denial of Service Attacks, Intrusion Detection, Hacking Secure Code in Windows 2000.

Security Warrior

Security Warrior
Title Security Warrior PDF eBook
Author Cyrus Peikari
Publisher "O'Reilly Media, Inc."
Pages 554
Release 2004-01-12
Genre Computers
ISBN 0596552394

Download Security Warrior Book in PDF, Epub and Kindle

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Maximum PC

Maximum PC
Title Maximum PC PDF eBook
Author
Publisher
Pages 110
Release 2000-08
Genre
ISBN

Download Maximum PC Book in PDF, Epub and Kindle

Maximum PC is the magazine that every computer fanatic, PC gamer or content creator must read. Each and every issue is packed with punishing product reviews, insightful and innovative how-to stories and the illuminating technical articles that enthusiasts crave.