An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most up-to-date technology available. The content for the Second Edition has been updated to cover the 2.4 kernel, and additional chapters on VPNs, SSH, and Tripwires have been added.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Bob Ziegler graduated from the University of Wisconsin-Madison with an undergraduate degree in psychology, following near-completions in both German and philosophy. After taking educational and career trips in several directions, he decided to make his hobby his career and earned a master's degree in computer science, also from the University of Wisconsin-Madison. Out of school, Bob became one of a team of two UNIX operating system developers working for a company developing a mini-supercomputer. He developed a multiprocessor version of BSD 4.3 UNIX as a side project to the team's ongoing uniprocessor development efforts. Since then, he has worked as a UNIX operating system kernel developer for R&D companies in the Boston area. The advent of Linux and consumer access to 24/7 Internet connectivity gave Bob the keys to a dream he'd had since 1982 -- to have his own UNIX server and LAN at home. What began as a pragmatic effort to make his system secure on the Internet quickly grew into a passion for the home UNIX user. He offers free, web-based Linux firewall design services to the public, as well as a popular firewall and LAN FAQ to help people quickly get their Linux systems set up securely. Bob most recently functioned as a firewall architect at Nokia, collaborating wiht several groups in Massachusetts, California, and Finland. Carl B. Constantine has workin the computer industry for many years. He's been a programmer, consultant, technical writer, troubleshooter, and anything else he could get his paws into. Carl lives in beautiful Victoria, British Columbia, Canada, with his wife, Terry, and four children, Rebekah, 6, Emily, 4, Matthew, 2, and Joshua, 6 months. Carl is a programmer analyst/UNIX system administrator for the Department of Computer Science at the University of Victoria, in Victoria, British Columbia, Canada.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. 2nd Edition. Used book that is in clean, average condition without any missing pages. Artikel-Nr. 4123505-75
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0735710996I4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0735710996I4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Reno, Reno, NV, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Artikel-Nr. G0735710996I4N00
Anzahl: 1 verfügbar
Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
Zustand: Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. Artikel-Nr. wbs4181324378
Anzahl: 1 verfügbar
Anbieter: WorldofBooks, Goring-By-Sea, WS, Vereinigtes Königreich
Paperback. Zustand: Very Good. An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most up-to-date technology available. The content for the Second Edition has been updated to cover the 2.4 kernel, and additional chapters on VPNs, SSH, and Tripwires have been added. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged. Artikel-Nr. GOR001762488
Anzahl: 1 verfügbar
Anbieter: Hubert Colau, LA BAZOCHE GOUET, Frankreich
Zustand: very good. Broché bon état .Contenu propre .562 pages . 2002. PHOTOS SUR DEMANDE. Artikel-Nr. 16561ALW
Anzahl: 1 verfügbar