Hacking Linux Exposed (Hacking Exposed) - Softcover

Hatch, Brian; Lee, James; Kurtz, George

 
9780072225648: Hacking Linux Exposed (Hacking Exposed)

Inhaltsangabe

Offers detailed information on Linux-specific internal and external hacks, explaining how to tighten and maintain security on Linux networks.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Über die Autorin bzw. den Autor

Brian Hatch is a UNIX/Linux security consultant, administrator, and expert hacker with Onsight, Inc. He has taught various courses at Northwestern University and is the co-maintainer of Stunnel, a widely used secure SSL wrapper. He is the lead author of the first edition of Hacking Exposed Linux.

James Lee is a Perl hacker, Linux administrator, security consultant, and open source advocate. James is the founder and CEO of Onsight Inc., a consulting firm specializing in Perl training and web development. James is also a co-author of the first edition of Hacking Exposed Linux.

George Kurtz, co-author of all three editions of the international best-seller, Hacking Exposed, and co-author of Hacking Exposed Linux is the CEO of Foundstone, Inc., a premier security consulting and training company.

Von der hinteren Coverseite

"Years of collective hands-on expertise for those who want to actually understand the Linux threats and countermeasures. Excellent!" --Dave Wreski, CEO, Guardian Digital and co-author of Linux Security HOTWO

Secure your Linux network by thinking like an attacker

Evolving Web technology and new software releases make online security more challenging than ever. The number of hackers--both sophisticated crackers and script-kiddies--is growing constantly, and it's just a matter of time before your network becomes a target. Hacking Linux Exposed, Second Edition shows you, step-by-step, how to proactively defend against the latest Linux-specific attacks by getting inside the mind of today's most devious hackers. You'll learn how intruders gather information, specify targets, exploit weak spots, and gain control--usually while remaining undetected. Read case studies about both common and little-known break-ins, tips on how and why they occurred, and detailed countermeasures against these attacks. If you're a Linux professional who's serious about security, this is the one book you can't afford to be without.

What you'll learn:

  • The proven Hacking Exposed methodology to locate and fix vulnerable points in networks and Linux software
  • Details on security features of all Linux distributions--including Red Hat, Debian, SuSE, and Slackware
  • How to successfully use vulnerability scanning tools, intrusion detections systems, honeypots, and log analysis software
  • Best practices for using whois databases, ping sweeps, DNS zone transfers, and port scans
  • Common mail server bugs, tips for email encryption, and spam prevention
  • Latest attack methods involving Trojaned programs, back doors, kernel hacks, password cracks, and session hijacking
  • Ways to protect against Denial of Service and wireless network attacks
  • Methods for preventing local users from getting root privileges
  • Rules for using TCP wrappers and firewall strategies with ipchains and iptables
  • Valuable checklists and tips on hardening your system based on the authors' real-world experience

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.