Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Real World Linux Security (2nd Edition)

Buy

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks—and arm you with breakthrough resources for protecting yourself!

  • Surprising new IP Tables research every netadmin must know about
  • New techniques and software for detecting and blocking ARP and Switch attacks
  • Important enhancements to Linux-based adaptive firewalls
  • Thoroughly revised coverage of Samba security for Windows clients
  • 802.11b wireless networks security
  • How to make the most of Logcheck, Portsentry, and other new monitoring tools
  • VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more
  • Includes all-new chapter on physical security
  • Reviewed by some of the world's leading Linux security experts!
Web Site

The accompanying web site contains the author's own state-of-the-art software for instantly locking out hackers and alerting system administrators. The website contents also include exclusive IP Tables and IP Chains firewall scripts (rule sets), as well as powerful new tools for monitoring network health, detecting and reporting suspicious activities, securing backups, simplifying recovery, and much more.

 

About the Author
BOB TOXEN has 28 years of UNIX/Linux experience. One of the 162 recognized developers of Berkeley UNIX, he learned about security as a student at UC Berkeley, where he cracked several of the original UNIX systems there. He is now President of Fly-By-Day Consulting, specializing in Linux and network security, firewalls, VPNs, 24x7 network monitoring, response, and administration for clients worldwide. In 2002, his recommendations were included in a report on improving U.S. intelligence that was presented to President Bush at the President's request. Toxen currently works with the U.S. Centers for Disease Control and Prevention to combat bioterrorism.

(HTML tags aren't allowed.)

Adobe Captivate 7 for Mobile Learning
Adobe Captivate 7 for Mobile Learning

These are exciting times for the eLearning industry. Tablets and smartphones are revolutionizing the way students consume digital content. These mobile devices provide a world of new technical challenges and pedagogical opportunities. Learn how to leverage this new power with Adobe Captivate 7 and be part of the m-learning revolution.

...
RSS and Atom in Action: Web 2.0 Building Blocks
RSS and Atom in Action: Web 2.0 Building Blocks

RSS and Atom in Action is organized into two parts. The first part introduces the blog technologies of news feed formats and publishing protocols-the building blocks. The second part shows how to put to those blocks together to assemble interesting and useful blog applications. In keeping with the behind Manning's "In...

The Courageous Follower: Standing Up to and for Our Leaders (2nd Edition)
The Courageous Follower: Standing Up to and for Our Leaders (2nd Edition)

This updated edition of a modern classic on followership provides the keys to creating an environment in which leaders are vigorously supported in pursuing the organization’s mission and courageously confronted when their actions threaten the organization’s well-being.

For every leader there are dozens of followers who work...


Domain Architectures : Models and Architectures for UML Applications
Domain Architectures : Models and Architectures for UML Applications
The last two decennia have witnessed many advances in the area of software
development. The advent of object-oriented programming languages and modelling
languages such as Unified Modeling Language (UML) has increased our ability
as developers to design and realize large and enterprise-wide software systems.
However, software
...
Ship Design for Efficiency and Economy, Second Edition
Ship Design for Efficiency and Economy, Second Edition
This book gives advice to students and naval architects on how to design ships - in particular with regard to hull design. The previous edition of this book was published in 1987. Since then, there have been numerous important developments in this area and the new additions to this book reflect these changes. Chapter 3 has been completely rewritten...
Knowledge Management 2.0: Organizational Models and Enterprise Strategies
Knowledge Management 2.0: Organizational Models and Enterprise Strategies
In the last few years, Knowledge Management (KM) practices have evolved in organizations. Due to the introduction of Web 2.0 technologies, new usages of information and knowledge sharing have emerged (Enterprise 2.0). The new generation of employees (Generation Y or Milennials) has new habits at work. They use everyday Web 2.0...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy