ISECOM | Hacking Exposed Linux | Buch | 978-0-07-226257-5 | sack.de

Buch, Englisch, 813 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 1194 g

ISECOM

Hacking Exposed Linux

Linux Security Secrets & Solutions
3. Auflage 2008
ISBN: 978-0-07-226257-5
Verlag: McGraw-Hill Education

Linux Security Secrets & Solutions

Buch, Englisch, 813 Seiten, Format (B × H): 191 mm x 235 mm, Gewicht: 1194 g

ISBN: 978-0-07-226257-5
Verlag: McGraw-Hill Education


Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. - Secure Linux by using attacks and countermeasures from the latest OSSTMM research

- Follow attack techniques of PSTN, ISDN, and PSDN over Linux

- Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux

- Block Linux signal jamming, cloning, and eavesdropping attacks

- Apply Trusted Computing and cryptography tools for your best defense

- Fix vulnerabilities in DNS, SMTP, and Web 2.0 services

- Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits

- Find and repair errors in C code with static analysis and Hoare Logic

ISECOM Hacking Exposed Linux jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Foreword
Acknowledgments
Introduction
Part I: Security and Controls
Chapter 1. Applying Security
Chapter 2. Applying Interactive Controls
Chapter 3. Applying Process Controls
Part II: Hacking the System
Chapter 4. Local Access Control
Chapter 5. Data Networks Security
Chapter 6. Unconventional Data Attack Vectors
Chapter 7. Voice over IP
Chapter 8. Wireless Networks
Chapter 9. Input/Output Devices
Chapter 10. RFID--Radio Frequency Identification
Chapter 11. Emanation Attacks
Chapter 12. Trusted Computing
Part III: Hacking the Users
Chapter 13. Web Application Hacking
Chapter 14. Mail Services
Chapter 15. Name Services
Part IV: Care and Maintenance
Chapter 16. Reliability: Static Analysis of C Code
Chapter 17. Security Tweaks in the Linux Kernal
Part V: Appendixes
Appendix A. Management and Maintenance
Appendix B. Linux Forensics and Data Recovery
Appendix C. BSD
Index


ISECOM, N/A
ISECOM (the Institute for Security and Open Methodologies), (Barcelona, Spain & New York, NY) is an open, collaborative, security research community established in January 2001. In order to fulfill its mission focus to apply critical thinking and scientific methodology to all facets of security, ISECOM is chartered as a commercial-free and non-partisan organization. The ISECOM Board of Directors reflects many countries representing thousands of members and volunteers from around the world. In a world of increasing commercial and industrial misrepresentation of security, ISECOM enables logical and rational decision-making in all aspects of security, integrity, privacy, and safety.

ISECOM (Institute for Security and Open Methodologies) is an open, nonprofit security research organization established in January 2001 with the mission to make sense of security. The research project team involved in the making of this book is also involved in other ISECOM projects such as the Open Source Security Testing Methodology Manual, Hacker Highschool, and the professional security certifications and trainings: OPST, OPSA, OPSE, and OWSE.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.