|
![]() |
|||
|
||||
OverviewRecognized Linux expert John Terpstra and security evangelist and 25-year IT industry veteran, Roberta Bragg cut through the noise to show you how to bullet proof your system before you are hacked!No more “hack and patch!” Harden your Linux system before it is hacked. “Do this NOW, here’s why, here’s how and don’t stop there!”Administrators and IT Pros have to do more with less. They don’t want multiple choice/consequences. They want to know what to do NOW to protect their systems against malicious attacks. Hacking Exposed Linux shows how to test, hack, and find the security holes and fix them. Hardening Linux shows you how to secure your Linux system to work securely in the first place Full Product DetailsAuthor: John Terpstra , Paul Love , Ronald Reck , Tim ScanlonPublisher: McGraw-Hill Education - Europe Imprint: McGraw-Hill Professional Dimensions: Width: 18.50cm , Height: 2.20cm , Length: 23.10cm Weight: 0.726kg ISBN: 9780072254976ISBN 10: 0072254971 Pages: 480 Publication Date: 16 August 2004 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsPart I: Do These Seven Things First Chapter 1: Critical First Steps Part II: Take It From The Top: The Systematic Hardening Process Chapter 2: Hardening Network Access: Disable Unnecessary Services Chapter 3: Installing Firewalls and Filters Chapter 4: Hardening Software Accessibility Chapter 5: Preparing for Disaster Chapter 6: Hardening Access Controls Chapter 7: Hardening Data Storage Chapter 8: Hardening Authentication and User Identity Chapter 9: Restricted Execution Environments Chapter 10: Hardening Communications Part III: Once Is Never Enough! Chapter 11: Install Network Monitoring Software Chapter 12: Automatic Logfile Scanning Chapter 13: Patch Management and Monitoring Chapter 14: Self-Monitoring Tools Part IV: How to Succeed at Hardening Linux Chapter 15: Budget Acquisition and Corporate Commitment to Security Chapter 16: Establishing a Security Campaign Appendix A: Additional Linux Security ResourcesReviewsAuthor InformationJohn H. Terpstra (Draper, Utah) is CEO/President or PrimaStasys, Inc., co-founder of the Samba-Team, former VP Technology with Caldera, VP of Development for TurboLinux, and he serves on the Linux Standards Base (the body that sets the specifications for Linux), as well as the Linux Professional Institute Academic Council, responsible for reviewing LPI Certification Exam Questions for accuracy, relevance, and method. He is also the co-founder of the Linux Internationalization Team proving that Linux is capable of true global deployment. John is a well-known contributor and visionary in the open source community with a very active commercial focus. He has more than 10 years of experience building secure Linux systems in large corporations such as GE Medical Systems, SHL Ltd (London), National Credit Insurance (Brokers) Pty. Ltd., Price Waterhouse, RetireInvest Pty. Ltd., Veritas Inc., and many other multi-national organizations. He is a highly accredited, assertive keynote speaker at key industry events around the world. John has presented at more than 50 open source and Linux events since 1999, and has been featured as the key international speaker at events in the USA, England, New Zealand, China, Japan, Singapore, Canada, Argentina, and Israel. Tab Content 6Author Website:Countries AvailableAll regions |