Linux and UNIX security portable reference
来源:互联网 发布:改装车软件 编辑:程序博客网 时间:2024/03/29 08:54
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
This book will teach you exactly how hackers think so that you can protect your Unix and Linux systems from them. There is simply no other way to learn how to prevent your systems from being compromised. In order to stop the attacks of the most sophisticated hackers, you need to understand their thought processes, techniques, and tactics. The powerful nature of the Unix and Linux operating systems is a two-edged sword. In most cases, the operating system kernel source code is available for free, and an administrator can go so far as to change the operating system internals to suit his or her needs. But this powerful and flexible nature of Unix and Linux includes an enormous amount of complexity, which increases the likelihood of possible misconfigurations that can easily place a system at risk. Consider also the many different flavors of Unix and Linux distributions available today. Every distribution comes bundled with its own set of security policies and configurations. For example, some distributions leave a set of remote services turned off, while others turn on all possible services that have been configured with the weakest possible policies. Hackers are aware of the administrative complexities of managing Unix and Linux hosts, and they know exactly how to abuse them. This book will amaze you with details of the craftiest hacker tactics, and it will teach you how to defend against them.
http://rapidshare.com/files/52598346/0072227869.zip
This book will teach you exactly how hackers think so that you can protect your Unix and Linux systems from them. There is simply no other way to learn how to prevent your systems from being compromised. In order to stop the attacks of the most sophisticated hackers, you need to understand their thought processes, techniques, and tactics. The powerful nature of the Unix and Linux operating systems is a two-edged sword. In most cases, the operating system kernel source code is available for free, and an administrator can go so far as to change the operating system internals to suit his or her needs. But this powerful and flexible nature of Unix and Linux includes an enormous amount of complexity, which increases the likelihood of possible misconfigurations that can easily place a system at risk. Consider also the many different flavors of Unix and Linux distributions available today. Every distribution comes bundled with its own set of security policies and configurations. For example, some distributions leave a set of remote services turned off, while others turn on all possible services that have been configured with the weakest possible policies. Hackers are aware of the administrative complexities of managing Unix and Linux hosts, and they know exactly how to abuse them. This book will amaze you with details of the craftiest hacker tactics, and it will teach you how to defend against them.
http://rapidshare.com/files/52598346/0072227869.zip
- Linux and UNIX security portable reference
- HackNotes Security Portable Reference Collection - 4 Books
- DB29 for Linux,UNIX,and WINDOWS - section 4(DB2 Security)
- Unix/Linux Command Reference
- Oracle Linux Reference Index of Security Vulnerability bug fixes, CVE IDs and Oracle Linux Errata
- Advanced DBA certification guide and reference for DB2 universal database v8 for Linux, UNIX, and Wi
- DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and Exam Prep (6th Edition)
- unix/linux socket API reference
- unix/linux socket API reference
- awk - Unix, Linux Command---reference
- A Quick Reference for Oracle Database 10g RAC on Linux and Unix Platforms
- Windows,Unix and Linux
- Unix and Linux
- UNIX AND LINUX
- Linux Security Systems and Tools
- DB2 9 for Linux, UNIX, and Windows: DBA Guide, Reference, and, Exam Prep (6th Edition) (Hardcover) Nov.2007.eBook-BBL
- Apache Portable Runtime and Tomcat
- Automating UNIX and Linux Administration
- Advanced Linux Networking
- Linux unwired
- 手机探索者开发实录—需求简述
- Facebook成为美国四大电视台争夺观众阵地
- Java keytool 安全证书学习
- Linux and UNIX security portable reference
- 控制台下输出DLL的调试信息
- C++中的四种类型转换
- 心跳线激活后外网无法访问服务器
- The unusually useful web book
- 代码库之八-信息输出类(0.1)
- VBProject:代码操作代码之常用语句
- Beginning J2EE 5: From Novice to Professional
- vb 6 实现网页自动填写自动提交功能