Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hack proofing Linuxa guide to open s...
~
ScienceDirect (Online service)
Hack proofing Linuxa guide to open source security /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Hack proofing LinuxJames Stanger.
Reminder of title:
a guide to open source security /
Author:
Stanger, James.
Published:
Rockland, Mass. :Syngress Media ;2001.
Description:
528 p. ;23 cm. +1 computer disk (digital ; 4 3/4 in.)
Notes:
Includes index.
Subject:
Computer security.
Online resource:
An electronic book accessible through the World Wide Web; click for information
Online resource:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781928994343
ISBN:
9781928994343
Hack proofing Linuxa guide to open source security /
Stanger, James.
Hack proofing Linux
a guide to open source security /[electronic resource] :James Stanger. - Rockland, Mass. :Syngress Media ;2001. - 528 p. ;23 cm. +1 computer disk (digital ; 4 3/4 in.)
Includes index.
From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781928994343
Source: 100773:100781Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Uniform Titles:
Linux.
Subjects--Topical Terms:
184416
Computer security.
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / S73 2001eb
Dewey Class. No.: 005.8
Hack proofing Linuxa guide to open source security /
LDR
:02707cmm 2200325Ia 4500
001
256921
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
100818s2001 mau o 001 0 eng d
020
$a
9781928994343
020
$a
1928994342
029
1
$a
NZ1
$b
12435730
035
$a
(OCoLC)162719059
035
$a
ocn162719059
037
$a
100773:100781
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
049
$a
TEFA
050
1 4
$a
QA76.9.A25
$b
S73 2001eb
082
0 4
$a
005.8
$2
22
100
1
$a
Stanger, James.
$3
454672
245
1 0
$a
Hack proofing Linux
$h
[electronic resource] :
$b
a guide to open source security /
$c
James Stanger.
260
$a
Rockland, Mass. :
$a
London :
$b
Syngress Media ;
$c
2001.
$b
International Thomson,
300
$a
528 p. ;
$c
23 cm. +
$e
1 computer disk (digital ; 4 3/4 in.)
500
$a
Includes index.
520
$a
From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
630
0 0
$a
Linux.
$3
215111
650
0
$a
Computer security.
$3
184416
655
7
$a
Electronic books.
$2
local.
$3
214472
710
2
$a
ScienceDirect (Online service)
$3
307425
776
1
$c
Original
$z
1928994342
$z
9781928994343
$w
(OCoLC)48677633
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781928994343
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781928994343
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000040008
電子館藏
1圖書
電子書
EB QA76.9.A25 S73 2001eb 2001
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://www.sciencedirect.com/science/book/9781928994343
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781928994343
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login