Hacking Linux Exposed / Edition 2
  • Alternative view 1 of Hacking Linux Exposed / Edition 2
  • Alternative view 2 of Hacking Linux Exposed / Edition 2

Hacking Linux Exposed / Edition 2

5.0 1
by Brian Hatch, James Lee, George Kurtz, George Kurtz
     
 

ISBN-10: 0072225645

ISBN-13: 9780072225648

Pub. Date: 12/01/2002

Publisher: McGraw-Hill Osborne

Tighten holes and maintain security on your Linux system! From the publisher of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes this must-have security handbook for anyone running Linux. This up-to-date edition shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed

Overview

Tighten holes and maintain security on your Linux system! From the publisher of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes this must-have security handbook for anyone running Linux. This up-to-date edition shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them.

Product Details

ISBN-13:
9780072225648
Publisher:
McGraw-Hill Osborne
Publication date:
12/01/2002
Series:
Security Series
Edition description:
Second Edition
Pages:
712
Product dimensions:
7.78(w) x 8.78(h) x 1.65(d)

Related Subjects

Table of Contents

Part I : Locking into Linux 1: Linux Security Overview 2: Proactive Security Measures 3: Mapping Your Machine and Network Part II: Breaking In from the Outside 4: Social Engineering, Trojans, and Other Cracker Trickery 5: Physical Attacks 6: Attacking over the Network 7: Advanced Network Attacks Part III: Local User Attacks 8: Elevating User Privileges 9: Linux Authentication Part IV: Server Issues 10: Mail Security 11: File Transfer Protocol Security 12: Web Servers and Dynamic Content 13: Access Control and Firewalls 14: Denial of Service Attacks Part V: After a Break-In 15: Covert Access 16: Back Doors 17: Advanced System Abuse Part VI: Appendixes A: Discovering and Recovering from an Attack B: Keeping Your Programs Current C: Turning Off Unneeded Software D: Case Studies

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Hacking Linux Exposed 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
I got the new version of Hacking Linux Exposed yesterday and read it straight through. I've been using the first edition since I bought it last year, but this one really blows the first one out of the water. It has a ton of new information - I particularly liked the stuff about wireless attacks and how to create a secure wireless network using VPNs so you don't need to rely on the wireless protocols that don't work correctly. Also the info about web hacks helped me find MANY bugs in our company's website that could have been used against us -- now we've got to see if we've been hacked before and start cleaning up.