Hacking Exposed Linux

Linux Security Secrets and Solutions

Nonfiction, Computers, Internet, Web Development, Java, Programming, Networking & Communications
Cover of the book Hacking Exposed Linux by ISECOM, McGraw-Hill Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISECOM ISBN: 9780071596428
Publisher: McGraw-Hill Education Publication: August 22, 2007
Imprint: McGraw-Hill Education Language: English
Author: ISECOM
ISBN: 9780071596428
Publisher: McGraw-Hill Education
Publication: August 22, 2007
Imprint: McGraw-Hill Education
Language: English

The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

  • Secure Linux by using attacks and countermeasures from the latest OSSTMM research
  • Follow attack techniques of PSTN, ISDN, and PSDN over Linux
  • Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
  • Block Linux signal jamming, cloning, and eavesdropping attacks
  • Apply Trusted Computing and cryptography tools for your best defense
  • Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
  • Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
  • Find and repair errors in C code with static analysis and Hoare Logic
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

More books from McGraw-Hill Education

Cover of the book Psychosocial Nursing Care: A Guide To Nursing The Whole Person by ISECOM
Cover of the book Build Your Own Free-to-Air (FTA) Satellite TV System by ISECOM
Cover of the book Candlestick Charting Explained Workbook: Step-by-Step Exercises and Tests to Help You Master Candlestick Charting by ISECOM
Cover of the book PERFECT POWER: How the Microgrid Revolution Will Unleash Cleaner, Greener, More Abundant Energy by ISECOM
Cover of the book The Instant Handbook of Boat Handling, Navigation, and Seamanship : A Quick-Reference Guide for Sail and Power: A Quick-Reference Guide for Sail and Power by ISECOM
Cover of the book A Manager'S Guide To Self-Development by ISECOM
Cover of the book Schaum's Outline of Preparatory Physics II: Electricity and Magnetism, Optics, Modern Physics by ISECOM
Cover of the book CCNA Cisco Certified Network Associate Voice Study Guide (Exams 640-460 & 642-436) by ISECOM
Cover of the book Business Statistics Demystified by ISECOM
Cover of the book Six Sigma on a Budget: Achieving More with Less Using the Principles of Six Sigma by ISECOM
Cover of the book Structural Engineering Formulas, Second Edition by ISECOM
Cover of the book Tools and Tactics for the Master DayTrader: Battle-Tested Techniques for Day, Swing, and Position Traders by ISECOM
Cover of the book Schaum's Outline of Mathematical Handbook of Formulas and Tables, Fifth Edition by ISECOM
Cover of the book The Vanke Way: Lessons on Driving Turbulent Change from a Global Real Estate Giant by ISECOM
Cover of the book Making Policy In British Higher Education 1945-2011 by ISECOM
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy