We use cookies to provide essential features and services. By using our website you agree to our use of cookies .

×

Warehouse Stock Clearance Sale

Grab a bargain today!

Hacking Exposed Linux
By

Rating

Product Description
Product Details

Table of Contents

Part I : Locking into Linux 1: Linux Security Overview 2: Proactive Security Measures 3: Mapping Your Machine and Network Part II: Breaking In from the Outside 4: Social Engineering, Trojans, and Other Cracker Trickery 5: Physical Attacks 6: Attacking over the Network 7: Advanced Network Attacks Part III: Local User Attacks 8: Elevating User Privileges 9: Linux Authentication Part IV: Server Issues 10: Mail Security 11: File Transfer Protocol Security 12: Web Servers and Dynamic Content 13: Access Control and Firewalls 14: Denial of Service Attacks Part V: After a Break-In 15: Covert Access 16: Back Doors 17: Advanced System Abuse Part VI: Appendixes A: Discovering and Recovering from an Attack B: Keeping Your Programs Current C: Turning Off Unneeded Software D: Case Studies

About the Author

Brian Hatch is a UNIX/Linux security consultant, administrator, and expert hacker with Onsight, Inc. He has taught various courses at Northwestern University and is the co-maintainer of Stunnel, a widely used secure SSL wrapper. He is the lead author of the first edition of Hacking Exposed Linux. James Lee is a Perl hacker, Linux administrator, security consultant, and open source advocate. James is the founder and CEO of Onsight Inc., a consulting firm specializing in Perl training and web development. James is also a co-author of the first edition of Hacking Exposed Linux. George Kurtz is co-founder and CEO of CrowdStrike, a cutting-edge big data security technology company focused on helping enterprises and governments protect their most sensitive intellectual property and national security information. George Kurtz is also an internationally recognized security expert, author, entrepreneur, and speaker. He has almost twenty years of experience in the security space and has helped hundreds of large organizations and government agencies around the world tackle the most demanding security problems. His entrepreneurial background and ability to commercialize nascent technologies has enabled him to drive innovation throughout his career by identifying market trends and correlating them with customer feedback, resulting in rapid growth for the businesses he has run. In 2011 George relinquished his role as McAfee's Worldwide Chief Technology Officer to his co-author and raised $26M in venture capital to create CrowdStrike. During his tenure as McAfee's CTO, Kurtz was responsible for driving the integrated security architectures and platforms across the entire McAfee portfolio. Kurtz also helped drive the acquisition strategy that allowed McAfee to grow from $1b in revenue in 2007 to over $2.5b in 2011. In one of the largest tech M&A deals in 2011, Intel (INTC) acquired McAfee for nearly $8b. Prior to joining McAfee, Kurtz was Chief Executive Officer and co-founder of Foundstone, Inc., which was acquired by McAfee in October 2004. You can follow George on Twitter @george_kurtz or his blog at http://www.securitybattlefield.com.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.
Back to top