Language:
English
繁體中文
Help
回圖書館
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hack proofing Linux = a guide to ope...
~
Stanger, James.
Hack proofing Linux = a guide to open source security /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Hack proofing Linux/ James Stanger.
Reminder of title:
a guide to open source security /
Author:
Stanger, James.
Published:
Rockland, Mass. :Syngress Media ; : 2001.,
Description:
528 p. ;23 cm. +; 1 computer disk (digital ; 4 3/4 in.) +
Notes:
Includes index.
Subject:
Computer security. -
Online resource:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9781928994343
Hack proofing Linux = a guide to open source security /
Stanger, James.
Hack proofing Linux
a guide to open source security /[electronic resource] :James Stanger. - Rockland, Mass. :Syngress Media ;2001. - 528 p. ;23 cm. +1 computer disk (digital ; 4 3/4 in.)
Includes index.
From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781928994343
Source: 100773:100781Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Uniform Titles:
Linux.
Subjects--Topical Terms:
86565
Computer security.
Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: QA76.9.A25 / S73 2001eb
Dewey Class. No.: 005.8
Hack proofing Linux = a guide to open source security /
LDR
:02707cmm 2200325Ia 4500
001
153295
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
160218s2001 mau o 001 0 eng d
020
$a
9781928994343
020
$a
1928994342
029
1
$a
NZ1
$b
12435730
035
$a
(OCoLC)162719059
035
$a
ocn162719059
037
$a
100773:100781
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.A25
$b
S73 2001eb
082
0 4
$a
005.8
$2
22
100
1
$a
Stanger, James.
$3
291695
245
1 0
$a
Hack proofing Linux
$h
[electronic resource] :
$b
a guide to open source security /
$c
James Stanger.
260
$a
Rockland, Mass. :
$a
London :
$c
2001.
$b
Syngress Media ;
$b
International Thomson,
300
$a
528 p. ;
$c
23 cm. +
$e
1 computer disk (digital ; 4 3/4 in.)
500
$a
Includes index.
520
$a
From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
630
0 0
$a
Linux.
$3
86417
650
0
$a
Computer security.
$3
86565
655
7
$a
Electronic books.
$2
local.
$3
96803
710
2
$a
ScienceDirect (Online service)
$3
254709
776
1
$c
Original
$z
1928994342
$z
9781928994343
$w
(OCoLC)48677633
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781928994343
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781928994343
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login