skip to content
Real-world Linux security : intrusion, prevention, detection, and recovery Preview this item
ClosePreview this item
Checking...

Real-world Linux security : intrusion, prevention, detection, and recovery

Author: Bob Toxen
Publisher: Upper Saddle River, NJ : Prentice Hall, 2001.
Series: Prentice Hall PTR open source technology series.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
CD-ROM contains: security tools developed by author; publicly available security tools; modified version of popclient; author's GPG 1.0.1 public key.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Bob Toxen
ISBN: 0130281875 9780130281876
OCLC Number: 44979693
Description: xxx, 694 pages : illustrations ; 24 cm + 1 computer optical disc (4 3/4 in.).
Contents: Introduction --
pt. I. Securing your system --
Quick fixes for common problems --
Quick and easy break-ins and how to avoid them --
Common break-ins by subsystem --
Common attacks --
Advanced security issues --
Establishing security policies --
Trusting other computers --
Gusty break-ins --
Case studies --
Recent break-ins --
pt. II. Preparing for an intrusion --
Hardening your system --
Preparing your hardware --
Preparing your configuration --
Scanning your own system --
pt. III. Detecting an intrusion --
Monitoring activity --
Scanning your system for anomalies --
pt. IV. Recovering from an intrusion --
Regaining control of your system --
Finding and repairing the damage --
Finding the attacker's system --
Having the cracker crack rocks --
App. A. Internet resources for the latest intrusions and defenses --
App. B. Books, CD-ROMs, and Videos --
App. C. Networks services and ports --
App. D. The PORTS. C listing --
App. E. The BLOCKIP. CSH listing --
the App. F. The FPROMISC. CSH listing --
App. G. The OVERWRITE. C listing --
App. H. Danger levels --
App. I. About the CD-ROM --
App. J. Glossary.
Series Title: Prentice Hall PTR open source technology series.
Responsibility: Bob Toxen.

Abstract:

A guide to securing your Linux system against intruders and recovering from intrusions if they do occur. Topics covered are securing your system, preparing for an intrusion, detecting an intrusion  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/44979693> # Real-world Linux security : intrusion, prevention, detection, and recovery
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "44979693" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/12542108#Place/upper_saddle_river_nj> ; # Upper Saddle River, NJ
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
   schema:about <http://dewey.info/class/005.8/e21/> ;
   schema:about <http://id.worldcat.org/fast/1382136> ; # Linux.
   schema:about <http://experiment.worldcat.org/entity/work/data/12542108#CreativeWork/linux> ; # Linux
   schema:about <http://id.worldcat.org/fast/1046280> ; # Operating systems (Computers)
   schema:bookFormat bgn:PrintBook ;
   schema:creator <http://viaf.org/viaf/256157049> ; # Bob Toxen
   schema:datePublished "2001" ;
   schema:description "CD-ROM contains: security tools developed by author; publicly available security tools; modified version of popclient; author's GPG 1.0.1 public key."@en ;
   schema:description "Introduction -- pt. I. Securing your system -- Quick fixes for common problems -- Quick and easy break-ins and how to avoid them -- Common break-ins by subsystem -- Common attacks -- Advanced security issues -- Establishing security policies -- Trusting other computers -- Gusty break-ins -- Case studies -- Recent break-ins -- pt. II. Preparing for an intrusion -- Hardening your system -- Preparing your hardware -- Preparing your configuration -- Scanning your own system -- pt. III. Detecting an intrusion -- Monitoring activity -- Scanning your system for anomalies -- pt. IV. Recovering from an intrusion -- Regaining control of your system -- Finding and repairing the damage -- Finding the attacker's system -- Having the cracker crack rocks -- App. A. Internet resources for the latest intrusions and defenses -- App. B. Books, CD-ROMs, and Videos -- App. C. Networks services and ports -- App. D. The PORTS. C listing -- App. E. The BLOCKIP. CSH listing -- the App. F. The FPROMISC. CSH listing -- App. G. The OVERWRITE. C listing -- App. H. Danger levels -- App. I. About the CD-ROM -- App. J. Glossary."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/12542108> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/12542108#Series/prentice_hall_ptr_open_source_technology_series> ; # Prentice Hall PTR open source technology series.
   schema:name "Real-world Linux security : intrusion, prevention, detection, and recovery"@en ;
   schema:productID "44979693" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/44979693#PublicationEvent/upper_saddle_river_nj_prentice_hall_2001> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/12542108#Agent/prentice_hall> ; # Prentice Hall
   schema:workExample <http://worldcat.org/isbn/9780130281876> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/44979693> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/12542108#Place/upper_saddle_river_nj> # Upper Saddle River, NJ
    a schema:Place ;
   schema:name "Upper Saddle River, NJ" ;
    .

<http://experiment.worldcat.org/entity/work/data/12542108#Series/prentice_hall_ptr_open_source_technology_series> # Prentice Hall PTR open source technology series.
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/44979693> ; # Real-world Linux security : intrusion, prevention, detection, and recovery
   schema:name "Prentice Hall PTR open source technology series." ;
   schema:name "Prentice Hall PTR open source technology series" ;
    .

<http://id.worldcat.org/fast/1046280> # Operating systems (Computers)
    a schema:Intangible ;
   schema:name "Operating systems (Computers)"@en ;
    .

<http://id.worldcat.org/fast/1382136> # Linux.
    a schema:CreativeWork ;
   schema:name "Linux." ;
    .

<http://viaf.org/viaf/256157049> # Bob Toxen
    a schema:Person ;
   schema:familyName "Toxen" ;
   schema:givenName "Bob" ;
   schema:name "Bob Toxen" ;
    .

<http://worldcat.org/isbn/9780130281876>
    a schema:ProductModel ;
   schema:isbn "0130281875" ;
   schema:isbn "9780130281876" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.