Synopses & Reviews
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.
- Secure Linux by using attacks and countermeasures from the latest OSSTMM research
- Follow attack techniques of PSTN, ISDN, and PSDN over Linux
- Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
- Block Linux signal jamming, cloning, and eavesdropping attacks
- Apply Trusted Computing and cryptography tools for your best defense
- Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
- Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
- Find and repair errors in C code with static analysis and Hoare Logic
Synopsis
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
The Latest Linux Security Solutions
This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.
- Secure Linux by using attacks and countermeasures from the latest OSSTMM research
- Follow attack techniques of PSTN, ISDN, and PSDN over Linux
- Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
- Block Linux signal jamming, cloning, and eavesdropping attacks
- Apply Trusted Computing and cryptography tools for your best defense
- Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
- Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
- Find and repair errors in C code with static analysis and Hoare Logic
About the Author
ISECOM (Institute for Security and Open Methodologies) is an open, nonprofit security research organization established in January 2001 with the mission to make sense of security. The research project team involved in the making of this book is also involved in other ISECOM projects such as the Open Source Security Testing Methodology Manual, Hacker Highschool, and the professional security certifications and trainings: OPST, OPSA, OPSE, and OWSE.
Table of Contents
Part 1 - PHYSEC - Case Study #1Audits and AggressionHarware SecurityLocal Access SecurityPart 2 - COMMSEC - Case Study #2Network SecurityNetwork Security Interactive ControlsNetwork Security Process ControlsTelecommunicationsVoice Over IPPart 3 - SPECSEC - Case Study #3Wireless Network SecurityInput/Output Device SecurityCellular Network SecurityPacket Radio and Shortwave SecurityRFID SecurityEmanationsPart 4 - HUMSEC - Case Study #4Web Services SecurityMail Services SecurityDomain Service SecurityStatic Analysis of C CodeTrusted SecurityPart 5 - AppendicesAppendix A - Security Tweaks in the Linux KernalAppendix B - Forensics and Accident RecoveryAppendix C - Management and Maintenance Appendix D - BSD SecurityAppendix E - OSSTMM Threat MapAppendix F - Linux Security Evaluations and Certifications