• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
How to cheat at securing Linux /

پدید آورنده
Mohan Krishnamurthy [and others].

موضوع
Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

رده
TK5105
.
59
.
H683
2008eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0080558682
(Number (ISBN
1597492078
(Number (ISBN
9780080558684
(Number (ISBN
9781597492072

NATIONAL BIBLIOGRAPHY NUMBER

Number
b750909

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
How to cheat at securing Linux /
General Material Designation
[Book]
First Statement of Responsibility
Mohan Krishnamurthy [and others].

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Burlington, MA :
Name of Publisher, Distributor, etc.
Syngress,
Date of Publication, Distribution, etc.
©2008.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xvi, 415 pages) :
Other Physical Details
illustrations

CONTENTS NOTE

Text of Note
Chapter 1: Introduction to Open Source Security -- Chapter 2: Hardening the Operating System -- Chapter 3: System Scanning and Probing -- Chapter 4: Implementing an Intrusion Detection System -- Chapter 5: Troubleshooting the Network with Sniffers -- Chapter 6: Unearthing Rootkits -- Chapter 7: Defending Against Malware -- Chapter 8: Defending Databases -- Chapter 9: Network Authentication and Encryption -- Chapter 10: Avoiding Sniffing Attacks through Encryption -- Chapter 11: Creating Virtual Private Networks -- Chapter 12: Implementing and Maintaining a Firewall.
0

SUMMARY OR ABSTRACT

Text of Note
Are you one of the millions of SysAdmins running a Linux server who cant find a current book on Linux security? Well.this is the book for you. How to Cheat at Securing Linux Servers is designed to help you deploy a Linux system on the Internet in a variety of security roles. This book provides practical instructions and pointers concerning the open source security tools that we use every day. This book shows you how to use your Linux skills to provide the most important security services such as encryption, authentication, access control, and logging. While writing the book, the authors had the following three-part structure in mind: locking down the network, securing data passing across the network, and protecting the network perimeter with firewalls, DMZs, and VPNs. The Perfect Reference for the Multitasked SysAdmin * Discover Why "Measure Twice, Cut Once" Applies to Securing Linux * Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases * Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Elsevier Science & Technology
Stock Number
141532:141676

OTHER EDITION IN ANOTHER MEDIUM

Title
How to cheat at securing Linux.
International Standard Book Number
9781597492072

TITLE USED AS SUBJECT

Linux.
Linux.
Linux.

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer networks-- Security measures.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59
Book number
.
H683
2008eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Krishnamurthy Madwachar, Mohan.

ORIGINATING SOURCE

Date of Transaction
20201204103900.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival