English
United States
Sign in
Tip from find-more-books.com
Similar books
More/other books that might be very similar to this book
Search tools
Book recommendations
Latest news
Advertising
FILTER
- 0 Results
Lowest price: 0.93 €, highest price: 29.00 €, average price: 10.41 €
Hacking Linux Exposed, Second Edition - Brian Hatch, James Lee
book is out-of-stock
(*)
Brian Hatch, James Lee:
Hacking Linux Exposed, Second Edition - Paperback

ISBN: 0072225645

[SR: 971770], Paperback, [EAN: 9780072225648], McGraw-Hill Osborne Media, McGraw-Hill Osborne Media, Book, [PU: McGraw-Hill Osborne Media], McGraw-Hill Osborne Media, Tighten holes and maintain security on your Linux system! From the publisher of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes this must-have security handbook for anyone running Linux. This up-to-date edition shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them., "Throw up a Linux box," comes the chorus whenever there's a need to provide some network service or other without impinging upon the boss's martini budget. Fair enough, but by doing so are you opening security holes you don't know how to find or fix? The newest edition of Hacking Linux Exposed helps you answer that question and solve many of the security problems you find. To a certain extent this book is a recipe collection in that it describes weaknesses in Linux (calling attention to specific distributions where appropriate). The authors stop short of explicitly showing you how to wage most kinds of attacks, a reasonable thing to do from an ethical point of view even though the instructions can be found easily on the Internet. Rather than do that, they give step-by-step instructions on how to defend against the attacks they catalog. The point is not, "Here's precisely how to bring down a server by means of an ACK storm," but rather, "Here's how to defend against such problems." They do demonstrate plenty of weaknesses, though, as in their coverage of the conversation that goes back and forth between an FTP server and its client.This book covers pretty much everything you'd want to do with a Linux machine as a network server. Read it and see some of the weaknesses in your system--and do something about them before someone else does. --David Wall Topics covered: Security best practices, approached from the perspective of what can go wrong and what can be done about the problems. Specific coverage goes to all major services, including user management, FTP, HTTP, and firewalling., 3740, Networks, Protocols & APIs, 3742, COM & DCOM, 3743, CORBA, 3744, ISDN, 3745, LAN, 69960, LDAP, 3747, Networks, 3749, ODBC, 170900, SNMP, 3624, TCP-IP, 132568011, WAN, 3652, Networking & Cloud Computing, 5, Computers & Technology, 1000, Subjects, 283155, Books, 3746, Network Security, 3652, Networking & Cloud Computing, 5, Computers & Technology, 1000, Subjects, 283155, Books, 291380, Networking & System Administration, 3849, Linux, 3756, Operating Systems, 5, Computers & Technology, 1000, Subjects, 283155, Books, 291381, Programming, 3849, Linux, 3756, Operating Systems, 5, Computers & Technology, 1000, Subjects, 283155, Books, 3778, Unix, 3779, AIX, 3780, Administration, 3782, DNS & Bind, 3787, Shell, 3756, Operating Systems, 5, Computers & Technology, 1000, Subjects, 283155, Books, 4053, Software, 69760, Accounting, 6133990011, Adobe, 10806626011, Databases, 10806627011, Design & Graphics, 4164, E-mail, 10806628011, Enterprise Applications, 271582011, Mathematical & Statistical, 10806637011, Microsoft, 132553011, Optical Character Recognition, 4169, Personal Finance, 10806632011, Presentation Software, 10806633011, Project Management Software, 69761, Quickbooks, 10806634011, Spreadsheets, 10806635011, Suites, 4072, Utilities, 300354, Voice Recognition, 10806636011, Word Processing, 5, Computers & Technology, 1000, Subjects, 283155, Books, 3608, Java, 3612, Beginner's Guides, 3616, Reference, 173561, Servlets, 3952, Programming Languages, 5, Computers & Technology, 1000, Subjects, 283155, Books, 3648, Hacking, 69766, Internet & Social Media, 5, Computers & Technology, 1000, Subjects, 283155, Books, 377560011, Security & Encryption, 3875, Cryptography, 3632, Encryption, 3648, Hacking, 3746, Network Security, 3641, Privacy & Online Safety, 10806585011, Security Certifications, 3636, Viruses, 5, Computers & Technology, 1000, Subjects, 283155, Books, 491302, Networking, 468204, Computer Science, 465600, New, Used & Rental Textbooks, 2349030011, Specialty Boutique, 283155, Books, 491312, Operating Systems, 468204, Computer Science, 465600, New, Used & Rental Textbooks, 2349030011, Specialty Boutique, 283155, Books

Used or antiquarian book Amazon.com
Goodwill Colorado Springs
Gebraucht Shipping costs:Usually ships in 1-2 business days, plus shipping costs
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.
Hacking Linux Exposed, Second Edition - Brian Hatch, James Lee
book is out-of-stock
(*)
Brian Hatch, James Lee:
Hacking Linux Exposed, Second Edition - Paperback

ISBN: 0072225645

[SR: 971770], Paperback, [EAN: 9780072225648], McGraw-Hill Osborne Media, McGraw-Hill Osborne Media, Book, [PU: McGraw-Hill Osborne Media], McGraw-Hill Osborne Media, Tighten holes and maintain security on your Linux system! From the publisher of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes this must-have security handbook for anyone running Linux. This up-to-date edition shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them., "Throw up a Linux box," comes the chorus whenever there's a need to provide some network service or other without impinging upon the boss's martini budget. Fair enough, but by doing so are you opening security holes you don't know how to find or fix? The newest edition of Hacking Linux Exposed helps you answer that question and solve many of the security problems you find. To a certain extent this book is a recipe collection in that it describes weaknesses in Linux (calling attention to specific distributions where appropriate). The authors stop short of explicitly showing you how to wage most kinds of attacks, a reasonable thing to do from an ethical point of view even though the instructions can be found easily on the Internet. Rather than do that, they give step-by-step instructions on how to defend against the attacks they catalog. The point is not, "Here's precisely how to bring down a server by means of an ACK storm," but rather, "Here's how to defend against such problems." They do demonstrate plenty of weaknesses, though, as in their coverage of the conversation that goes back and forth between an FTP server and its client.This book covers pretty much everything you'd want to do with a Linux machine as a network server. Read it and see some of the weaknesses in your system--and do something about them before someone else does. --David Wall Topics covered: Security best practices, approached from the perspective of what can go wrong and what can be done about the problems. Specific coverage goes to all major services, including user management, FTP, HTTP, and firewalling., 3740, Networks, Protocols & APIs, 3742, COM & DCOM, 3743, CORBA, 3744, ISDN, 3745, LAN, 69960, LDAP, 3747, Networks, 3749, ODBC, 170900, SNMP, 3624, TCP-IP, 132568011, WAN, 3652, Networking & Cloud Computing, 5, Computers & Technology, 1000, Subjects, 283155, Books, 3746, Network Security, 3652, Networking & Cloud Computing, 5, Computers & Technology, 1000, Subjects, 283155, Books, 291380, Networking & System Administration, 3849, Linux, 3756, Operating Systems, 5, Computers & Technology, 1000, Subjects, 283155, Books, 291381, Programming, 3849, Linux, 3756, Operating Systems, 5, Computers & Technology, 1000, Subjects, 283155, Books, 3778, Unix, 3779, AIX, 3780, Administration, 3782, DNS & Bind, 3787, Shell, 3756, Operating Systems, 5, Computers & Technology, 1000, Subjects, 283155, Books, 4053, Software, 69760, Accounting, 6133990011, Adobe, 10806626011, Databases, 10806627011, Design & Graphics, 4164, E-mail, 10806628011, Enterprise Applications, 271582011, Mathematical & Statistical, 10806637011, Microsoft, 132553011, Optical Character Recognition, 4169, Personal Finance, 10806632011, Presentation Software, 10806633011, Project Management Software, 69761, Quickbooks, 10806634011, Spreadsheets, 10806635011, Suites, 4072, Utilities, 300354, Voice Recognition, 10806636011, Word Processing, 5, Computers & Technology, 1000, Subjects, 283155, Books, 3608, Java, 3612, Beginner's Guides, 3616, Reference, 173561, Servlets, 3952, Programming Languages, 5, Computers & Technology, 1000, Subjects, 283155, Books, 3648, Hacking, 69766, Internet & Social Media, 5, Computers & Technology, 1000, Subjects, 283155, Books, 377560011, Security & Encryption, 3875, Cryptography, 3632, Encryption, 3648, Hacking, 3746, Network Security, 3641, Privacy & Online Safety, 10806585011, Security Certifications, 3636, Viruses, 5, Computers & Technology, 1000, Subjects, 283155, Books, 491302, Networking, 468204, Computer Science, 465600, New, Used & Rental Textbooks, 2349030011, Specialty Boutique, 283155, Books, 491312, Operating Systems, 468204, Computer Science, 465600, New, Used & Rental Textbooks, 2349030011, Specialty Boutique, 283155, Books

New book Amazon.com
A1 Books and More
Neuware Shipping costs:Usually ships in 1-2 business days, plus shipping costs
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.
Hacking Exposed Linux, 2nd Edition - Hatch, Brian / Lee, James / Kurtz, George
book is out-of-stock
(*)
Hatch, Brian / Lee, James / Kurtz, George:
Hacking Exposed Linux, 2nd Edition - used book

ISBN: 9780072225648

ID: 263144

Tighten holes and maintain security on your Linux system From the publisher of the international best-seller, "Hacking Exposed: Network Security Secrets & Solutions," comes this must-have security handbook for anyone running Linux. This up-to-date edition shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them. Hacking Exposed Linux, 2nd Edition Hatch, Brian / Lee, James / Kurtz, George, McGraw-Hill/Osborne Media

Used or antiquarian book Betterworldbooks.com
Shipping costs:zzgl. Versandkosten, plus shipping costs
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.
Hacking Linux Exposed, Second Edition - Brian Hatch, James Lee
book is out-of-stock
(*)
Brian Hatch, James Lee:
Hacking Linux Exposed, Second Edition - Paperback

ISBN: 9780072225648

ID: 897091822

McGraw-Hill Osborne Media. Paperback. GOOD. Gently used may contain ex-library markings, possibly has some light highlighting, textual notations, and or underlining. Text is still easily readable., McGraw-Hill Osborne Media

Used or antiquarian book Biblio.com
Discover Books
Shipping costs: EUR 8.39
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.
hacking linux exposed - hatch/ lee
book is out-of-stock
(*)
hatch/ lee:
hacking linux exposed - used book

2003, ISBN: 9780072225648

[ED: broschiert], [PU: mcgraw-hill], [SC: 5.00]

Used or antiquarian book Booklooker.de
mäander23
Shipping costs:Versand nach Deutschland (EUR 5.00)
Details...
(*) Book out-of-stock means that the book is currently not available at any of the associated platforms we search.