語系:
繁體中文
English
說明(常見問題)
回圖書館
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hack proofing Linux = a guide to ope...
~
Stanger, James.
Hack proofing Linux = a guide to open source security /
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Hack proofing Linux/ James Stanger.
其他題名:
a guide to open source security /
作者:
Stanger, James.
出版者:
Rockland, Mass. :Syngress Media ; : 2001.,
面頁冊數:
528 p. ;23 cm. +; 1 computer disk (digital ; 4 3/4 in.) +
附註:
Includes index.
標題:
Computer security. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9781928994343
Hack proofing Linux = a guide to open source security /
Stanger, James.
Hack proofing Linux
a guide to open source security /[electronic resource] :James Stanger. - Rockland, Mass. :Syngress Media ;2001. - 528 p. ;23 cm. +1 computer disk (digital ; 4 3/4 in.)
Includes index.
From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781928994343
Source: 100773:100781Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Uniform Titles:
Linux.
Subjects--Topical Terms:
86565
Computer security.
Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: QA76.9.A25 / S73 2001eb
Dewey Class. No.: 005.8
Hack proofing Linux = a guide to open source security /
LDR
:02707cmm 2200325Ia 4500
001
153295
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
160218s2001 mau o 001 0 eng d
020
$a
9781928994343
020
$a
1928994342
029
1
$a
NZ1
$b
12435730
035
$a
(OCoLC)162719059
035
$a
ocn162719059
037
$a
100773:100781
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.A25
$b
S73 2001eb
082
0 4
$a
005.8
$2
22
100
1
$a
Stanger, James.
$3
291695
245
1 0
$a
Hack proofing Linux
$h
[electronic resource] :
$b
a guide to open source security /
$c
James Stanger.
260
$a
Rockland, Mass. :
$a
London :
$c
2001.
$b
Syngress Media ;
$b
International Thomson,
300
$a
528 p. ;
$c
23 cm. +
$e
1 computer disk (digital ; 4 3/4 in.)
500
$a
Includes index.
520
$a
From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
630
0 0
$a
Linux.
$3
86417
650
0
$a
Computer security.
$3
86565
655
7
$a
Electronic books.
$2
local.
$3
96803
710
2
$a
ScienceDirect (Online service)
$3
254709
776
1
$c
Original
$z
1928994342
$z
9781928994343
$w
(OCoLC)48677633
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781928994343
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781928994343
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入