Cantitate/Preț
Produs

Hardening Linux

Autor John Terpstra, Paul Love, Ronald Reck, Tim Scanlon
en Limba Engleză Paperback – 15 aug 2004
Recognized Linux expert John Terpstra and security evangelist and 25-year IT industry veteran, Roberta Bragg cut through the noise to show you how to bullet proof your system before you are hacked! No more “hack and patch!” Harden your Linux system before it is hacked. “Do this NOW, here’s why, here’s how and don’t stop there!”
Administrators and IT Pros have to do more with less. They don’t want multiple choice/consequences. They want to know what to do NOW to protect their systems against malicious attacks. Hacking Exposed Linux shows how to test, hack, and find the security holes and fix them. Hardening Linux shows you how to secure your Linux system to work securely in the first place
Citește tot Restrânge

Preț: 24177 lei

Preț vechi: 30222 lei
-20% Nou

Puncte Express: 363

Preț estimativ în valută:
4627 4806$ 3843£

Carte disponibilă

Livrare economică 13-27 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780072254976
ISBN-10: 0072254971
Pagini: 404
Ilustrații: 1
Dimensiuni: 185 x 231 x 22 mm
Greutate: 0.77 kg
Editura: McGraw Hill Education
Colecția McGraw-Hill Education
Locul publicării:United States

Cuprins

Part I: Do These Seven Things First

Chapter 1: Critical First Steps

Part II: Take It From The Top: The Systematic Hardening Process

Chapter 2: Hardening Network Access: DisableUnnecessary Services

Chapter 3: Installing Firewalls and Filters

Chapter 4: Hardening Software Accessibility

Chapter 5: Preparing for Disaster

Chapter 6: Hardening Access Controls

Chapter 7: Hardening Data Storage

Chapter 8: Hardening Authentication and User Identity

Chapter 9: Restricted Execution Environments

Chapter 10: Hardening Communications

Part III: Once Is Never Enough!

Chapter 11: Install Network Monitoring Software

Chapter 12: Automatic Logfile Scanning

Chapter 13: Patch Management and Monitoring

Chapter 14: Self-Monitoring Tools

Part IV: How to Succeed at Hardening Linux

Chapter 15: Budget Acquisition and CorporateCommitment to Security

Chapter 16: Establishing a Security Campaign

Appendix A: Additional Linux Security Resources