Real World Linux Security, 2/e
Bob Toxen
- 出版商: Prentice Hall
- 出版日期: 2002-11-23
- 定價: $1,750
- 售價: 6.0 折 $1,050
- 語言: 英文
- 頁數: 848
- 裝訂: Paperback
- ISBN: 0130464562
- ISBN-13: 9780130464569
-
相關分類:
Linux、資訊安全
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
$1,100$1,078 -
$300$237 -
$650$553 -
$399Real World Linux Security: Intrusion Prevention, Detection and Recovery
-
$980$774 -
$2,320$2,204 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$1,520Linux System Security, 2/e
-
$1,260UNIX System Management Primer Plus (Paperback)
-
$560$504 -
$2,320$2,204 -
$1,840$1,748 -
$1,650$1,568 -
$600$474 -
$550$435 -
$420$378 -
$580$493 -
$480$374 -
$1,045Linux Kernel Development
-
$399Automating Unix and Linux Administration (Paperback)
-
$480$379 -
$299Linux for Non-Geeks (Paperback)
-
$550$429 -
$580$458 -
$580$458
相關主題
商品描述
Newly revised edition of the top-selling book
Table of Contents
List of Figures.
List of Tables.
Foreword.
Acknowledgments.
About the Author.
1. Introduction.
I. SECURING YOUR SYSTEM.
2. Quick Fixes for Common Problems.
3. Quick and Easy Hacking and How
to Avoid It.
4. Common Hacking by Subsystem.
5. Common Hacker Attacks.
6. Advanced Security Issues.
7. Establishing Security Policies.
8.
Trusting Other Computers.
9. Gutsy Break-Ins.
10. Case Studies.
11.
Recent Break-Ins.
II. PREPARING FOR AN INTRUSION.
12. Hardening Your System.
13. Preparing Your Hardware.
14.
Preparing Your Configuration.
15. Scanning Your Own System.
III. DETECTING AN INTRUSION.
16. Monitoring Activity.
17. Scanning Your System for Anomalies.
IV. RECOVERING FROM AN INTRUSION.
18. Regaining Control of Your System.
19. Finding and Repairing the
Damage.
20. Finding the Attacker's System.
21. Having the Cracker Crack
Rocks.
Appendix A. Internet Resources for the Latest Intrusions and
Defenses.
Appendix B. Books, CD-ROMs, and Videos.
Appendix C. Network
Services and Ports.
Appendix D. Danger Levels.
Appendix E. About the
CD-ROM.
Appendix F. Abbreviations.
Index.
商品描述(中文翻譯)
暢銷書籍的新版修訂
目錄
圖表清單。表格清單。前言。致謝。關於作者。1. 簡介。
I. 保護您的系統。
2. 常見問題的快速修復。3. 快速且簡單的駭客攻擊及其避免方法。4. 各子系統的常見駭客攻擊。5. 常見的駭客攻擊方式。6. 高級安全問題。7. 建立安全政策。8. 信任其他電腦。9. 大膽的入侵。10. 個案研究。11. 最近的入侵事件。
II. 為入侵做準備。
12. 強化您的系統。13. 準備您的硬體。14. 準備您的配置。15. 掃描您自己的系統。
III. 偵測入侵。
16. 監控活動。17. 掃描系統以檢測異常。
IV. 從入侵中恢復。
18. 重新掌控您的系統。19. 尋找並修復損害。20. 尋找攻擊者的系統。21. 讓駭客碎石。附錄A. 網際網路資源,提供最新的入侵和防禦資訊。附錄B. 書籍、CD-ROM和影片。附錄C. 網路服務和埠口。附錄D. 危險等級。附錄E. 關於CD-ROM。附錄F. 縮寫。索引。