Part I : Locking into Linux 1: Linux Security Overview 2: Proactive Security Measures 3: Mapping Your Machine and Network Part II: Breaking In from the Outside 4: Social Engineering, Trojans, and Other Cracker Trickery 5: Physical Attacks 6: Attacking over the Network 7: Advanced Network Attacks Part III: Local User Attacks 8: Elevating User Privileges 9: Linux Authentication Part IV: Server Issues 10: Mail Security 11: File Transfer Protocol Security 12: Web Servers and Dynamic Content 13: Access Control and Firewalls 14: Denial of Service Attacks Part V: After a Break-In 15: Covert Access 16: Back Doors 17: Advanced System Abuse Part VI: Appendixes A: Discovering and Recovering from an Attack B: Keeping Your Programs Current C: Turning Off Unneeded Software D: Case Studies
Brian Hatch is a UNIX/Linux security consultant, administrator, and
expert hacker with Onsight, Inc. He has taught various courses at
Northwestern University and is the co-maintainer of Stunnel, a
widely used secure SSL wrapper. He is the lead author of the first
edition of Hacking Exposed Linux.
James Lee is a Perl hacker, Linux administrator, security
consultant, and open source advocate. James is the founder and CEO
of Onsight Inc., a consulting firm specializing in Perl training
and web development. James is also a co-author of the first edition
of Hacking Exposed Linux.
George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge
big data security technology company focused on helping enterprises
and governments protect their most sensitive intellectual property
and national security information. George Kurtz is also an
internationally recognized security expert, author, entrepreneur,
and speaker. He has almost twenty years of experience in the
security space and has helped hundreds of large organizations and
government agencies around the world tackle the most demanding
security problems. His entrepreneurial background and ability to
commercialize nascent technologies has enabled him to drive
innovation throughout his career by identifying market trends and
correlating them with customer feedback, resulting in rapid growth
for the businesses he has run.
In 2011 George relinquished his role as McAfee’s Worldwide Chief
Technology Officer to his co-author and raised $26M in venture
capital to create CrowdStrike. During his tenure as McAfee’s CTO,
Kurtz was responsible for driving the integrated security
architectures and platforms across the entire McAfee portfolio.
Kurtz also helped drive the acquisition strategy that allowed
McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011.
In one of the largest tech M&A deals in 2011, Intel (INTC)
acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was
Chief Executive Officer and co-founder of Foundstone, Inc., which
was acquired by McAfee in October 2004. You can follow George on
Twitter @george_kurtz or his blog at
http://www.securitybattlefield.com.
![]() |
Ask a Question About this Product More... |
![]() |