
This lawful beam will assistance we secure your Linux network–whether we make use of Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten a ISECOM way, Hacking Exposed Linux, Third Edition provides a many present coverage accessible from a vast group of topic-focused experts. The book is formed upon a ultimate ISECOM confidence investigate as well as shows you, in full detail, how to close out intruders as well as urge your Linux systems opposite inauspicious attacks.
Secure Linux by regulating attacks as well as countermeasures from a ultimate OSSTMM research
Follow conflict techniques of PSTN, ISDN, as well as PSDN over Linux
Harden VoIP, Bluetooth, RF, RFID, as well as IR inclination upon Linux
Block Linux vigilance jamming, cloning, as well as eavesdropping attacks
Apply Trusted Computing as well as cryptography collection for your most appropriate defense
Fix vulnerabilities in DNS, SMTP, as well as Web 2.0 services
Prevent SPAM, Trojan, phishing, DoS, as well as DDoS exploits
Find as well as correct errors in C formula with immobile research as well as Hoare Logic
Publisher: McGraw-Hill Osborne Media; 3 book (July 15, 2008)
ISBN-10: 0072262575
ISBN-13: 978-0072262575
No comments:
Post a Comment