This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. The book is based on the latest ISECOM security research and shows, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. About The ISECOM (Institute for Security and Open Methodologies) is an open, nonprofit security research organization established in January 2001 with the mission to make sense of security. Table of Contents Foreword Acknowledgments Introduction Part Security and Controls Chapter 1. Applying Security Chapter 2. Applying Interactive Controls Chapter 3. Applying Process Controls Part Hacking the System Chapter 4. Local Access Control Chapter 5. Data Networks Security Chapter 6. Unconventional Data Attack Vectors Chapter 7. Voice over IP Chapter 8. Wireless Networks Chapter 9. Input/Output Devices Chapter 10. RFID--Radio Frequency Identification Chapter 11. Emanation Attacks Chapter 12. Trusted Computing Part Hacking the Users Chapter 13. Web Application Hacking Chapter 14. Mail Services Chapter 15. Name Services Part Care and Maintenance Chapter 16. Static Analysis of C Code Chapter 17. Security Tweaks in the Linux Kernal Part Appendixes Appendix A. Management and Maintenance Appendix B. Linux Forensics and Data Recovery Appendix C. BSD Index
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want