Linux Linux Security Secrets and Solutions

ISBN-10: 0072225645
ISBN-13: 9780072225648
Edition: 2nd 2003 (Revised)
List price: $49.99
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Completely updated and revised to cover the latest Linux security vulnerabilities and tools, this book provides details about brand-new Linux attacks, counter measures and case studies.

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $49.99
Edition: 2nd
Copyright year: 2003
Publisher: McGraw-Hill Osborne
Publication date: 12/4/2002
Binding: Paperback
Pages: 712
Size: 7.25" wide x 8.75" long x 1.50" tall
Weight: 2.640
Language: English

Completely updated and revised to cover the latest Linux security vulnerabilities and tools, this book provides details about brand-new Linux attacks, counter measures and case studies.

Locking into Linux
Linux Security Overviewp. 3
Proactive Security Measuresp. 43
Mapping Your Machine and Networkp. 103
Breaking In from the Outside
Social Engineering, Trojans, and Other Cracker Trickeryp. 175
Physical Attacksp. 213
Attacking over the Networkp. 241
Advanced Network Attacksp. 285
Local User Attacks
Elevating User Privilegesp. 335
Linux Authenticationp. 383
Server Issues
Mail Securityp. 407
File Transfer Protocol Securityp. 433
Web Servers and Dynamic Contentp. 461
Access Control and Firewallsp. 511
Denial of Service Attacksp. 537
After a Break-In
Covert Accessp. 559
Back Doorsp. 585
Advanced System Abusep. 621
Appendixes
Discovering and Recovering from an Attackp. 641
Keeping Your Programs Currentp. 651
Turning Off Unneeded Softwarep. 671
Case Studiesp. 687
Indexp. 693
Table of Contents provided by Syndetics. All Rights Reserved.

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×