Cart
Free Shipping in the UK
Proud to be B-Corp

Hacking Linux Exposed Brian Hatch

Hacking Linux Exposed By Brian Hatch

Hacking Linux Exposed by Brian Hatch


£5.60
New RRP £29.99
Condition - Very Good
Only 1 left

Summary

This guide aims to provide systems administrators with insights into how to find and exploit security holes in Linux - and how they can be fixed. It covers vulnerabilities found on common Linux distributions, for example, Red Hat and SuSE.

Hacking Linux Exposed Summary

Hacking Linux Exposed by Brian Hatch

Tighten holes and maintain security on your Linux system! From one of the authors of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes a must-have security handbook for anyone running Linux. This cutting-edge volume shows you how to think like a Linux hacker in order to beat the Linux hacker. You'll get detailed information on Linux-specific hacks, both internal and external, and how to stop them.

About Brian Hatch

Brian Hatch is a UNIX/Linux security consultant, administrator, and expert hacker with Onsight, Inc. He has taught various courses at Northwestern University and is the co-maintainer of Stunnel, a widely used secure SSL wrapper. He is the lead author of the first edition of Hacking Exposed Linux. James Lee is a Perl hacker, Linux administrator, security consultant, and open source advocate. James is the founder and CEO of Onsight Inc., a consulting firm specializing in Perl training and web development. James is also a co-author of the first edition of Hacking Exposed Linux. George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfees Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfees CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

Table of Contents

Part I: Locking Into Linux. Chapter 1: Linux Security Overview. Chapter 2: Proactive Measures and Recovering from a Break-In. Chapter 3: Mapping Your Machine and Network. Part II: Getting in from the Outside. Chapter 4: Social Engineering, Trojans, and Other Hacker Trickery. Chapter 5: Physical Attacks. Chapter 6: Attacking Over the Network. Chapter 7: Abusing the Network Itself. Part III: Local User Attacks. Chapter 8: Elevating User Privileges. Chapter 9: Password Cracking. Chapter 10: How Hackers Maintain Access. Part IV: Server Issues. Chapter 11: Mail and FTP Security. Chapter 12: Web Servers and Dynamic Content. Chapter 13: Access Control and Firewalls. Part V: Appendices. Appendix A: Keeping Your Programs Current. Appendix B: Turning Off Unneeded Services. Appendix C: Online Resources. Appendix D: Case Studies.

Additional information

GOR001861680
9780072127737
0072127732
Hacking Linux Exposed by Brian Hatch
Used - Very Good
Paperback
McGraw-Hill Education - Europe
20010416
566
N/A
Book picture is for illustrative purposes only, actual binding, cover or edition may vary.
This is a used book - there is no escaping the fact it has been read by someone else and it will show signs of wear and previous use. Overall we expect it to be in very good condition, but if you are not entirely satisfied please get in touch with us

Customer Reviews - Hacking Linux Exposed