Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Linux

Buy
Hacking Exposed Linux, 9780072262575 (0072262575), McGraw-Hill, 2008
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are interested in Linux.

Many call it Linux instead of GNU-Linux, its full name—much the same way you’d call a friend by a nickname. Perhaps this is due to the intimacy that you can achieve with this operating system through its source code. Or from the experience of being part of a special community. Whatever it is though, everyone can benefit from communicating with a machine that is honestly attributable to the transparency and openness of Linux.

Although not the dominant operating system on the Internet, Linux is quite prevalent, considering that the overwhelming majority of servers running web services, email services, and name services all depend on other open-source code that works with Linux. And this is where the trouble begins. Can something so open be properly secured?

The difficulty begins when you need secure it. How do you secure something like this, with its collectively designed hosting components that are built, rebuilt, and reconfigured by whim and can differ from machine to machine? You will seldom find two identical systems. How then can you approach the possibility of providing security for all of them?

This edition of Hacking Exposed Linux is based on the work of ISECOM, an open security research organization with the mission to “Make sense of security.” ISECOM has thousands of members worldwide and provides extensive methodologies and frameworks in regards to security, safety, and privacy. ISECOM uses open collaboration and extensive peer review to obtain the highest possible quality research—which is also how this edition was developed. Many security enthusiasts and professionals collaborated to create a book that is factual, practical, and really captures the spirit of Linux. Only in this way can you expect to find the means of securing Linux in all of its many forms.
(HTML tags aren't allowed.)

Kivy: Interactive Applications in Python - Second Edition
Kivy: Interactive Applications in Python - Second Edition

Create responsive cross-platform UI/UX applications and games in Python using the open source Kivy library

About This Book

  • Utilize the power of Kivy to develop applications that run on all the major platforms
  • Build user interfaces (UI) and control multi-touch events to improve the user...
Frommer's Paris Free and Dirt Cheap (Frommer's Free & Dirt Cheap)
Frommer's Paris Free and Dirt Cheap (Frommer's Free & Dirt Cheap)

Paris Free & Dirt Cheap will offer readers a multitude of choices, insiders knowledge, local short-cuts and tips to maximise their time in the city when on a budget. From the left and right banks to around the islands and along the river, this guide will explore shopping, eating, drinking, museums, monuments, shows, readings,...

The Gale Encyclopedia of Diets: A Guide to Health and Nutrition, Two Volume Set
The Gale Encyclopedia of Diets: A Guide to Health and Nutrition, Two Volume Set

The Gale Encyclopedia of Diets: A Guide to Health and Nutrition is a one-stop source for diet and nutrition information that covers popular and special diets, nutrition basics, and nutrition-related health conditions. It also particularly addresses health and nutrition concerns across all age groups from infancy through old age. This...


Implementing Cisco UCS Solutions
Implementing Cisco UCS Solutions

Cisco Unified Computer System is a powerful solution for data centers that can raise efficiency and lower costs. This tutorial helps professionals realize its full potential through a practical, hands-on approach written by two Cisco experts.

Overview

  • Learn about various Cisco UCS equipment options...
Bayesian Approach to Inverse Problems
Bayesian Approach to Inverse Problems

Many scientific, medical or engineering problems raise the issue of recovering some physical quantities from indirect measurements; for instance, detecting or quantifying flaws or cracks within a material from acoustic or electromagnetic measurements at its surface is an essential problem of non-destructive evaluation. The concept of inverse...

The Manager's Guide to Effective Meetings
The Manager's Guide to Effective Meetings

Now translated into 11 languages! This reader-friendly, icon-rich series is must reading for all managers at every level

All managers, whether brand new to their positions or well established in the corporate heirarchy, can use a little "brushing up" now and then. The skills-based Briefcase Books series is filled...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy