rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780072262575

Hacking Exposed Linux Linux Security Secrets and Solutions

by ISECOM
  • ISBN13:

    9780072262575

  • ISBN10:

    0072262575

  • eBook ISBN(s):

    9780072262575, 9780072262575

  • Additional ISBN(s):

    9780071596428, 9780072225648

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2008-08-05
  • Publisher: McGraw Hill
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $55.00 Save up to $0.05
  • Buy New
    $54.95
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-3 BUSINESS DAYS

Summary

The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic

Author Biography

ISECOM (Institute for Security and Open Methodologies) is an open, collaborative, security research community established in January 2001.

Table of Contents

Physec - Case Study #1
Audits and Aggression Harware Security
Local Access Security
Commsec - Case Study #2
Network Security
Network Security Interactive Controls
Network Security Process Controls
Telecommunications Voice Over IP
Specsec - Case Study #3
Wireless Network Security
Input/Output Device Security
Cellular Network Security
Packet Radio and Shortwave Security
RFID Security Emanations
Humsec - Case Study #4
Web Services Security
Mail Services Security
Domain Service Security
Static Analysis of C Code
Trusted Security
Appendices
Security Tweaks in the Linux Kernal
Forensics and Accident Recovery
Management and Maintenance
BSD Security
OSSTMM Threat Map
Linux Security Evaluations and Certifications
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program