Hacking Linux Exposed - Brian Hatch, James Lee, George Kurtz

Hacking Linux Exposed

Buch | Softcover
566 Seiten
2001
McGraw-Hill Professional (Verlag)
978-0-07-212773-7 (ISBN)
37,40 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
This guide aims to provide systems administrators with insights into how to find and exploit security holes in Linux - and how they can be fixed. It covers vulnerabilities found on common Linux distributions, for example, Red Hat and SuSE.
Tighten holes and maintain security on your Linux system! From one of the authors of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes a must-have security handbook for anyone running Linux. This cutting-edge volume shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them.

Brian Hatch is a UNIX/Linux security consultant, administrator, and expert hacker with Onsight, Inc. He has taught various courses at Northwestern University and is the co-maintainer of Stunnel, a widely used secure SSL wrapper. He is the lead author of the first edition of Hacking Exposed Linux. James Lee is a Perl hacker, Linux administrator, security consultant, and open source advocate. James is the founder and CEO of Onsight Inc., a consulting firm specializing in Perl training and web development. James is also a co-author of the first edition of Hacking Exposed Linux. George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfees Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfees CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

Part I: Locking Into Linux. Chapter 1: Linux Security Overview. Chapter 2: Proactive Measures and Recovering from a Break-In. Chapter 3: Mapping Your Machine and Network. Part II: Getting in from the Outside. Chapter 4: Social Engineering, Trojans, and Other Hacker Trickery. Chapter 5: Physical Attacks. Chapter 6: Attacking Over the Network. Chapter 7: Abusing the Network Itself. Part III: Local User Attacks. Chapter 8: Elevating User Privileges. Chapter 9: Password Cracking. Chapter 10: How Hackers Maintain Access. Part IV: Server Issues. Chapter 11: Mail and FTP Security. Chapter 12: Web Servers and Dynamic Content. Chapter 13: Access Control and Firewalls. Part V: Appendices. Appendix A: Keeping Your Programs Current. Appendix B: Turning Off Unneeded Services. Appendix C: Online Resources. Appendix D: Case Studies.

Erscheint lt. Verlag 16.4.2001
Sprache englisch
Maße 185 x 231 mm
Gewicht 1233 g
Themenwelt Informatik Betriebssysteme / Server Unix / Linux
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
ISBN-10 0-07-212773-2 / 0072127732
ISBN-13 978-0-07-212773-7 / 9780072127737
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Die wichtigen Befehle

von Daniel J. Barrett

Buch | Softcover (2024)
O'Reilly (Verlag)
16,90
das umfassende Handbuch

von Dirk Deimeke; Daniel van Soest; Stefan Kania

Buch | Hardcover (2023)
Rheinwerk (Verlag)
69,90
das umfassende Handbuch

von Michael Kofler

Buch | Hardcover (2023)
Rheinwerk (Verlag)
49,90