Real World Linux Security

  • Authors:
  • Bob Toxen

  • Affiliations:
  • -

  • Venue:
  • Real World Linux Security
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

From the Publisher:"You have in your hands a book I've been waiting to read for years—a practical, hands-on guide to hardening your Linux system." —From the foreword by Eric S. Raymond Safeguard your Linux systems against today's most vicious attacks! Realistic, step-by-step techniques from one of the world's leading Linux security experts Covers IP Tables, ARP attacks, adaptive firewalls, VPNs, wireless networks, Samba, monitoring, 2.4 kernel security, and much more Quick and effective recovery from intrusions CD-ROM contains important new tools for monitoring networks and locking out hackersStop today's most vicious Internet attackers—right in their tracks!Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacks—and arm you with breakthrough resources for protecting yourself! Surprising new IP Tables research every netadmin must know about New techniques and software for detecting and blocking ARP and Switch attacks Important enhancements to Linux-based adaptive firewalls Thoroughly revised coverage of Samba security for Windows clients 802.11b wireless networks security How to make the most of Logcheck, Portsentry, and otools VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more Includes all-new chapter on physical security Reviewed by some of the world's leading Linux security experts!CD-ROM INCLUDEDThe accompanying CD contains the author's own state-of-the-art software for instantly locking out hackers and alerting system administrators. The CD's contents also include exclusive IP Tables and IP Chains firewall scripts (rule sets), as well as powerful new tools for monitoring network health, detecting and reporting suspicious activities, securing backups, simplifying recovery, and much more.