This authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.
Table of Contents
Part I: Security and Controls.
Chapter 1. Applying Security.
Chapter 2. Applying Interactive Controls.
Chapter 3. Applying Process Controls.
Part II: Hacking the System.
Chapter 4. Local Access Control.
Chapter 5. Data Networks Security.
Chapter 6. Unconventional Data Attack Vectors.
Chapter 7. Voice over IP.
Chapter 8. Wireless Networks.
Chapter 9. Input/Output Devices.
Chapter 10. RFID--Radio Frequency Identification.
Chapter 11. Emanation Attacks.
Chapter 12. Trusted Computing.
Part III: Hacking the Users
Chapter 13. Web Application Hacking.
Chapter 14. Mail Services.
Chapter 15. Name Services.
Part IV: Care and Maintenance
Chapter 16. Reliability: Static Analysis of C Code.
Chapter 17. Security Tweaks in the Linux Kernal.
You can download this book from any of the following links. If any link is dead please feel free to leave a comment.
Download here (BOOK)
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.