×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Hacking Exposed Linux: Linux Security Secrets and Solutions / Edition 3
     

Hacking Exposed Linux: Linux Security Secrets and Solutions / Edition 3

5.0 1
by ISECOM
 

See All Formats & Editions

ISBN-10: 0072262575

ISBN-13: 9780072262575

Pub. Date: 07/15/2008

Publisher: McGraw-Hill Professional Publishing

The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network—whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of

Overview

The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network—whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

  • Secure Linux by using attacks and countermeasures from the latest OSSTMM research
  • Follow attack techniques of PSTN, ISDN, and PSDN over Linux
  • Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
  • Block Linux signal jamming, cloning, and eavesdropping attacks
  • Apply Trusted Computing and cryptography tools for your best defense
  • Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
  • Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
  • Find and repair errors in C code with static analysis and Hoare Logic

Product Details

ISBN-13:
9780072262575
Publisher:
McGraw-Hill Professional Publishing
Publication date:
07/15/2008
Series:
Hacking Exposed Series
Edition description:
REV
Pages:
813
Product dimensions:
7.20(w) x 9.00(h) x 1.40(d)

Related Subjects

Table of Contents

Foreword

Acknowledgments

Introduction

Part I: Security and Controls

Chapter 1. Applying Security

Chapter 2. Applying Interactive Controls

Chapter 3. Applying Process Controls

Part II: Hacking the System

Chapter 4. Local Access Control

Chapter 5. Data Networks Security

Chapter 6. Unconventional Data Attack Vectors

Chapter 7. Voice over IP

Chapter 8. Wireless Networks

Chapter 9. Input/Output Devices

Chapter 10. RFID—Radio Frequency Identification

Chapter 11. Emanation Attacks

Chapter 12. Trusted Computing

Part III: Hacking the Users

Chapter 13. Web Application Hacking

Chapter 14. Mail Services

Chapter 15. Name Services

Part IV: Care and Maintenance

Chapter 16. Reliability: Static Analysis of C Code

Chapter 17. Security Tweaks in the Linux Kernal

Part V: Appendixes

Appendix A. Management and Maintenance

Appendix B. Linux Forensics and Data Recovery

Appendix C. BSD

Index

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

Hacking Exposed Linux: Linux Security Secrets and Solutions 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
I just received my copy and am blown away by the breadth and depth! As a hobby user of Linux, just to try things out and tweak code if I have to, the book doesn't leave a single stone unturned. I already read through the first 3 chapters which express security in a way that really makes sense, then again it's an ISECOM book so why wouldn't it? I also read through the Wireless and RFID chapters because that's what I'm playing with right now and the book really opened my eyes to a lot of things I overlooked both in making and testing security. This book is a must-have!