- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
This item may be
Check for Availability
Hacking Linux exposed: (Linux security secrets & solutions )
Synopses & Reviews
From the publisher who brought you the international best-seller, Hacking Exposed: Network Security Secrets & Solutions...
Learn how to think like a hacker in order to secure your Linux network
In the ever-changing world of global data communications, inexpensive Internet connections, and fast-paced software development, security is constantly being compromised. Linux has always been considered the digital playground for hackers. Many hacks, exploits, and network security tools are written on Linux because it's readily available. Hacking Linux Exposed: Linux Security Secrets & Solutions shows you, step-by-step, how to defend against the latest Linux attacks by understanding the hacker's methods and sinister thought processes. You'll learn how your adversaries gather information, acquire targets, escalate privilege, gain control, plant back doors, and cover their tracks. Each chapter is divided into bite-sized chunks, covering highly publicized and little-known break-ins, tips on why they occurred, and detailed countermeasures that no Linux professional can afford to be without.
Table of Contents
Part I: Locking Into Linux.
Chapter 1: Linux Security Overview.
Chapter 2: Proactive Measures and Recovering from a Break-In.
Chapter 3: Mapping Your Machine and Network.
Part II: Getting in from the Outside.
Chapter 4: Social Engineering, Trojans, and Other Hacker Trickery.
Chapter 5: Physical Attacks.
Chapter 6: Attacking Over the Network.
Chapter 7: Abusing the Network Itself.
Part III: Local User Attacks.
Chapter 8: Elevating User Privileges.
Chapter 9: Password Cracking.
Chapter 10: How Hackers Maintain Access.
Part IV: Server Issues.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
What Our Readers Are Saying