Jump to content

Featured Replies

Posted
Real-world Linux Security

Real-world Linux Security

Intrusion, Prevention, Detection, and Recovery

by Bob Toxen

Publisher Prentice Hall Professional
Published Date 2001
Page Count 694
Categories Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux, Computers / Security / General
Language EN
Average Rating N/A (based on N/A ratings)
Maturity Rating No Mature Content Detected
ISBN 0130281875
Book Cover Cracker attacks are costing leading e-Businesses millions -- and spotlighting the dangers intruders pose to every participant in the new dot-com economy. If you rely on Linux, this is your systematic, comprehensive guide to protecting yourself. Security guru Bob Toxen uses real-world case studies from his own consulting career to show exactly how network and Internet security breaches can happen, what they look like when they do happen, and what you must do now to prevent them. The book is organized into four sections: securing your system, preparing for an intrusion, detecting an intrusion, and recovering from an intrusion. Toxen even provides at-a-glance icons and tables rating the severity and likelihood of each type of attack. Along the way, you'll learn how to configure systems so they alter themselves to lock out a cracker -- and notify the sysadmin immediately -- at the first sign of attack. You'll discover virtually cracker-proof techniques for protecting credit card databases, even if your web server and network are compromised. Toxen also presents 100+ pages of techniques for ensuring that, if a break-in does occur, damage will be minimal and a full recovery can happen fast. The accompanying CD-ROM includes a complete Linux security software library -- including powerful tools written by the author to detect cracker servers, and identify running cracker programs, even if they've been deleted from disk.
More Information
  • Views 29
  • Created
  • Last Reply

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.