Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Unix & Internet Security, 3rd Edition

Buy
This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.

It's been 11 years since the publication of Practical Unix Security—and 6 years since Practical Unix and Internet Security was published—and oh, what a difference that time has made!

In 1991, the only thing that most Americans knew about Unix and the Internet was that they were some sort of massive computer network that had been besieged by a "computer virus" in 1988. By 1996, when our second edition was published, the Internet revolution was just beginning to take hold, with more than 10 million Americans using the Internet on a regular basis to send electronic mail, cruise the World Wide Web, and sometimes even shop.

Today it is increasingly difficult for people in much of the world to remember the pre-Internet era. Perhaps 500 million people around the world now use the Internet, with several billion more touched by it in some manner. In the United States more than half the population uses the Internet on a daily basis. We have watched an Internet revolution become a dot-com craze, which then became a bust. And nobody remembers that 1988 Internet worm anymore—these days, most Internet users are bombarded by network worms on a daily basis.

One quarter of the respondents who suffered attacks said that they had experienced between 2 and 5 incidents; 39% said that they had experienced 10 or more incidents. The average reported financial loss per company per year was in excess of $2 million.

What do all of these numbers mean for Unix? To be sure, most of the systems in use today are based on Microsoft's Windows operating system. Unix and Unix variants are certainly more secure than Windows, for reasons that we'll discuss in this book. Nevertheless, experience tells us that a poorly-administered Unix computer can be just as vulnerable as a typical Windows system: if you have a vulnerability that is known, an attacker can find it, exploit it, and take over your computer. It is our goal in this book to show you how to prevent yourself from ever experiencing this fate—and if you do, it is our goal to tell you what to do about it.
(HTML tags aren't allowed.)

How to Solve It: A New Aspect of Mathematical Method
How to Solve It: A New Aspect of Mathematical Method

A perennial bestseller by eminent mathematician G. Polya, How to Solve It will show anyone in any field how to think straight. In lucid and appealing prose, Polya reveals how the mathematical method of demonstrating a proof or finding an unknown can be of help in attacking any problem that can be "reasoned" out--from building...

Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Advanced Topics in Electronic Commerce
Advanced Topics in Electronic Commerce
The Advanced Topics in Electronic Commerce Series provides comprehensive coverage and understanding of the social, cultural, organizational, human, and cognitive impacts of the EC technologies and advances on organizations around the world. These impacts include those of EC on consumer behavior as well as on organizational behavior, development,...

Cursive Script Text Recognition in Natural Scene Images: Arabic Text Complexities
Cursive Script Text Recognition in Natural Scene Images: Arabic Text Complexities
This book offers a broad and structured overview of the state-of-the-art methods that could be applied for context-dependent languages like Arabic. It also provides guidelines on how to deal with Arabic scene data that appeared in an uncontrolled environment impacted by different font size, font styles, image resolution, and opacity of...
Visual Media Coding and Transmission
Visual Media Coding and Transmission

This book presents the state-of-the-art in visual media coding and transmission

Visual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields of networked audiovisual systems and...

REST in Practice: Hypermedia and Systems Architecture
REST in Practice: Hypermedia and Systems Architecture

Why don't typical enterprise projects go as smoothly as projects you develop for the Web? Does the REST architectural style really present a viable alternative for building distributed systems and enterprise-class applications?

In this insightful book, three SOA experts provide a down-to-earth explanation of REST and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy