No more “hack and patch!” Harden your Linux system before it is hacked. “Do this NOW, here’s why, here’s how and don’t stop there!”
Administrators and IT Pros have to do more with less. They don’t want multiple choice/consequences. They want to know what to do NOW to protect their systems against malicious attacks. Hacking Exposed Linux shows how to test, hack, and find the security holes and fix them. Hardening Linux shows you how to secure your Linux system to work securely in the first place
"synopsis" may belong to another edition of this title.
“The proactive attitude towards implementing security, combined with the authors’ time-tested methods, are sure to produce dramatic results!” --Dave Wreski, CEO, Guardian Digital & co-author of Linux Security HOWTO
Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks--before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red Hat Enterprise Linux AS 3.0, and Novell’s SUSE Linux versions SLES8 and SLES9. Get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan.
Features a four-part hardening methodology:
John H. Terpstra is co-founder of the Samba Team and serves on the Linux Standards Base. He previously worked as VP of Technology for Caldera, and VP of Development for Turbolinux. Paul Love, CISSP, CISA, CISM, Security+, is technical editor for more than 10 best selling Linux and Unix books. He manages security at a large utilities service provider, and holds an MS in Network Security. Ronald P. Reck’s experience blends linguistics, NLP, and XML with UNIX systems. As a civilian contractor, he tackles large computational problems for distinguished clientele. Tim Scanlon recently worked on computer security for the 2004 Olympic Games. He has been a Common Criteria instructor, and has worked at MCI, TRW, Signal Corporation, and Inter.Net Global. He has worked in the public sector and with Mitre and Mitretek. Series Editor Roberta Bragg, CISSP, Security+, writes a column for the Security Watch newsletter, and is the author of Hardening Windows Systems and several other information security books.
"About this title" may belong to another edition of this title.
Shipping:
US$ 4.00
Within U.S.A.
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_0072254971
Book Description Paperback. Condition: new. New. Seller Inventory # Wizard0072254971
Book Description Condition: New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!. Seller Inventory # OTF-Y-9780072254976
Book Description Condition: New. Seller Inventory # ABLIING23Feb2215580015247
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think0072254971
Book Description PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9780072254976
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9780072254976_lsuk
Book Description PF. Condition: New. Seller Inventory # 6666-IUK-9780072254976
Book Description Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Seller Inventory # C9780072254976
Book Description PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9780072254976