Recognized Linux expert John Terpstra and security evangelist and 25-year IT industry veteran, Roberta Bragg cut through the noise to show you how to bullet proof your system before you are hacked! No more "hack and patch!" Harden your Linux system before it is hacked. "Do this NOW, here's why, here's how and don't stop there!" Administrators and IT Pros have to do more with less. They don't want multiple choice/consequences. They want to know what to do NOW to protect their systems against malicious attacks. Hacking Exposed Linux shows how to test, hack, and find the security holes and fix…mehr
Recognized Linux expert John Terpstra and security evangelist and 25-year IT industry veteran, Roberta Bragg cut through the noise to show you how to bullet proof your system before you are hacked! No more "hack and patch!" Harden your Linux system before it is hacked. "Do this NOW, here's why, here's how and don't stop there!" Administrators and IT Pros have to do more with less. They don't want multiple choice/consequences. They want to know what to do NOW to protect their systems against malicious attacks. Hacking Exposed Linux shows how to test, hack, and find the security holes and fix them. Hardening Linux shows you how to secure your Linux system to work securely in the first placeHinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
John H. Terpstra (Draper, Utah) is CEO/President or PrimaStasys, Inc., co-founder of the Samba-Team, former VP Technology with Caldera, VP of Development for TurboLinux, and he serves on the Linux Standards Base (the body that sets the specifications for Linux), as well as the Linux Professional Institute Academic Council, responsible for reviewing LPI Certification Exam Questions for accuracy, relevance, and method. He is also the co-founder of the Linux Internationalization Team proving that Linux is capable of true global deployment. John is a well-known contributor and visionary in the open source community with a very active commercial focus. He has more than 10 years of experience building secure Linux systems in large corporations such as GE Medical Systems, SHL Ltd (London), National Credit Insurance (Brokers) Pty. Ltd., Price Waterhouse, RetireInvest Pty. Ltd., Veritas Inc., and many other multi-national organizations. He is a highly accredited, assertive keynote speaker at key industry events around the world. John has presented at more than 50 open source and Linux events since 1999, and has been featured as the key international speaker at events in the USA, England, New Zealand, China, Japan, Singapore, Canada, Argentina, and Israel.
Inhaltsangabe
Part I: Do These Seven Things First Chapter 1: Critical First StepsPart II: Take It From The Top: The Systematic Hardening Process Chapter 2: Hardening Network Access: DisableUnnecessary Services Chapter 3: Installing Firewalls and Filters Chapter 4: Hardening Software Accessibility Chapter 5: Preparing for Disaster Chapter 6: Hardening Access Controls Chapter 7: Hardening Data Storage Chapter 8: Hardening Authentication and User Identity Chapter 9: Restricted Execution Environments Chapter 10: Hardening CommunicationsPart III: Once Is Never Enough! Chapter 11: Install Network Monitoring Software Chapter 12: Automatic Logfile Scanning Chapter 13: Patch Management and Monitoring Chapter 14: Self-Monitoring ToolsPart IV: How to Succeed at Hardening Linux Chapter 15: Budget Acquisition and CorporateCommitment to Security Chapter 16: Establishing a Security Campaign Appendix A: Additional Linux Security Resources
Part I: Do These Seven Things First Chapter 1: Critical First StepsPart II: Take It From The Top: The Systematic Hardening Process Chapter 2: Hardening Network Access: DisableUnnecessary Services Chapter 3: Installing Firewalls and Filters Chapter 4: Hardening Software Accessibility Chapter 5: Preparing for Disaster Chapter 6: Hardening Access Controls Chapter 7: Hardening Data Storage Chapter 8: Hardening Authentication and User Identity Chapter 9: Restricted Execution Environments Chapter 10: Hardening CommunicationsPart III: Once Is Never Enough! Chapter 11: Install Network Monitoring Software Chapter 12: Automatic Logfile Scanning Chapter 13: Patch Management and Monitoring Chapter 14: Self-Monitoring ToolsPart IV: How to Succeed at Hardening Linux Chapter 15: Budget Acquisition and CorporateCommitment to Security Chapter 16: Establishing a Security Campaign Appendix A: Additional Linux Security Resources
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497