logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Hack Proofing Linux The Only Way To Stop A Hacker Is To Think Like One James Stanger And Patrick T Lane Eds

  • SKU: BELL-4342142
Hack Proofing Linux The Only Way To Stop A Hacker Is To Think Like One James Stanger And Patrick T Lane Eds
$ 31.00 $ 45.00 (-31%)

0.0

0 reviews

Hack Proofing Linux The Only Way To Stop A Hacker Is To Think Like One James Stanger And Patrick T Lane Eds instant download after payment.

Publisher: Syngress
File Extension: PDF
File size: 20.25 MB
Pages: 655
Author: James Stanger and Patrick T. Lane (Eds.)
ISBN: 9781928994343, 1928994342
Language: English
Year: 2001

Product desciption

Hack Proofing Linux The Only Way To Stop A Hacker Is To Think Like One James Stanger And Patrick T Lane Eds by James Stanger And Patrick T. Lane (eds.) 9781928994343, 1928994342 instant download after payment.

  • "... I like this book. It would be a good textbook to use with a one-week Linux security workshop" -- Information Security Bulletin

Content:
Acknowledgments, Page v
Contributors, Pages vii-viii
Technical Editors, Page ix
Preface, Pages xxvii-xxix, James Stanger
Chapter 1 - Introduction to Open Source Security, Pages 1-39
Chapter 2 - Hardening the Operating System, Pages 41-108
Chapter 3 - System Scanning and Probing, Pages 109-190
Chapter 4 - Implementing an Intrusion Detection System, Pages 191-259
Chapter 5 - Troubleshooting the Network with Sniffers, Pages 261-297
Chapter 6 - Network Authentication and Encryption, Pages 299-351
Chapter 7 - Avoiding Sniffing Attacks through Encryption, Pages 353-389
Chapter 8 - Creating Virtual Private Networks, Pages 391-443
Chapter 9 - Implementing a Firewall with Ipchains and Iptables, Pages 445-506
Chapter 10 - Deploying the Squid Web Proxy Cache Server, Pages 507-541
Chapter 11 - Maintaining Firewalls, Pages 543-598
Appendix A - Bastille Log, Pages 599-604
Appendix B - Hack Proofing Linux Fast Track, Pages 605-635
Index, Pages 637-656

Related Products