Normal view MARC view ISBD view

Maximum Linux security : [a hacker's guide to protecting your Linux server and workstation] / Anonymous

Contributor(s): Ray, John, 1971-.
Publisher: Indianapolis, Ind. : Sams, c2001Edition: 2nd ed. / with revisions by John Ray.Description: xix, 870 p. : ill. ; 24 cm. + 1 electronic optical disc (CD-ROM) (4 3/4 in.).ISBN: 0672321343.Subject(s): Linux | Computer securityDDC classification: 005.8
Contents:
Introduction. - Pt. 1. Linux Security Basics. 1. Introducing Linux Security. 2. Physical Security. 3. Installation Issues. 4. Basic Linux System Administration. - Pt. II. Linux User Security. 5. Password Attacks. 6. Data Attacks. - Pt. III. Linux Network Security. 7. Malicious Code. 8. Sniffers and Electronic Eavesdropping. 9. Scanners. 10. Spoofing. - Pt. IV. Linux Internet Security. 11. FTP Security. 12. Mail Security. 13. Telnet and SSH Security. 14. Web Server Security. 15. Secure Web Protocols. 16. Secure Web Development. 17. File Sharing Security. 18. Denial-of-Service Attacks. 19. Linux and Firewalls. 20. Intrusion Detection. 21. Logs and Audit Trails. 22. Disaster Recovery. - Pt. V. Appendixes. A. Linux Security Command Reference. B. Linux Security Index-Past Linux Security Issues. C. Other Useful Linux Security Utilities/Applications. D. Linux/Unix Security Tools. E. Glossary. - Index.
Item type Current location Call number Vol info Copy number Status Notes Date due Barcode Remark
Accompanying Material (Media Resource) TU External Storage-LCS
005.8 MAX (Browse shelf) CD-ROM 1 Available SOCIT,15009,03,GR 1000116555 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1

Introduction. - Pt. 1. Linux Security Basics. 1. Introducing Linux Security. 2. Physical Security. 3. Installation Issues. 4. Basic Linux System Administration. - Pt. II. Linux User Security. 5. Password Attacks. 6. Data Attacks. - Pt. III. Linux Network Security. 7. Malicious Code. 8. Sniffers and Electronic Eavesdropping. 9. Scanners. 10. Spoofing. - Pt. IV. Linux Internet Security. 11. FTP Security. 12. Mail Security. 13. Telnet and SSH Security. 14. Web Server Security. 15. Secure Web Protocols. 16. Secure Web Development. 17. File Sharing Security. 18. Denial-of-Service Attacks. 19. Linux and Firewalls. 20. Intrusion Detection. 21. Logs and Audit Trails. 22. Disaster Recovery. - Pt. V. Appendixes. A. Linux Security Command Reference. B. Linux Security Index-Past Linux Security Issues. C. Other Useful Linux Security Utilities/Applications. D. Linux/Unix Security Tools. E. Glossary. - Index.

1 electronic optical disc (CD-ROM) : Maximum Linux security : version 2.0. 2nd ed.