HackNotes(tm) Linux and Unix Security Portable Reference - Softcover

Nitesh Dhanjani

  • 3.33 out of 5 stars
    12 ratings by Goodreads
 
9780072227864: HackNotes(tm) Linux and Unix Security Portable Reference

Synopsis

Safeguard your systems from all types of hackers, hijackers, and predators with help from this insightful resource. Get thorough, just-the-facts coverage of Linux, UNIX and Solaris, and learn about advanced hacking techniques including buffer overflows, password theory, port re-direction, and more.

"synopsis" may belong to another edition of this title.

About the Author

McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide

From the Back Cover

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!

  • Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
  • Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
  • Protect against privilege escalation attacks
  • Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
  • Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
  • Learn in-depth and current Linux and Unix system hardening guidelines
  • Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
  • Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
  • Understand the latest wireless (802.11) hacking techniques, tools, and defenses

"About this title" may belong to another edition of this title.