Hacking Exposed Linux: Linux Security Secrets and Solutions

The most recent Linux defense Solutions

This authoritative advisor might help you safe your Linux network--whether you utilize Linux as a laptop OS, for web providers, for telecommunications, or for instant prone. thoroughly rewritten the ISECOM means, Hacking uncovered Linux, 3rd Edition presents the main updated insurance to be had from a wide crew of topic-focused specialists. The booklet is predicated at the most recent ISECOM safety examine and indicates you, in complete element, find out how to lock out intruders and safeguard your Linux platforms opposed to catastrophic attacks.

  • Secure Linux by utilizing assaults and countermeasures from the most recent OSSTMM research
  • Follow assault options of PSTN, ISDN, and PSDN over Linux
  • Harden VoIP, Bluetooth, RF, RFID, and IR units on Linux
  • Block Linux sign jamming, cloning, and eavesdropping attacks
  • Apply relied on Computing and cryptography instruments on your most sensible defense
  • Fix vulnerabilities in DNS, SMTP, and net 2.0 services
  • Prevent unsolicited mail, Trojan, phishing, DoS, and DDoS exploits
  • Find and service blunders in C code with static research and Hoare Logic

Show description

Preview of Hacking Exposed Linux: Linux Security Secrets and Solutions PDF

Best Security books

Cyber War: The Next Threat to National Security and What to Do About It

Writer of the number 1 manhattan instances bestseller opposed to All Enemies, former presidential consultant and counter-terrorism professional Richard A. Clarke sounds a well timed and chilling caution approximately America’s vulnerability in a terrifying new foreign conflict—Cyber struggle! each involved American may still learn this startling and explosive e-book that provides an insider’s view of White residence ‘Situation Room’ operations and consists of the reader to the frontlines of our cyber protection.

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling desktop protection book--fully multiplied and updated"Right now you carry on your hand essentially the most winning safeguard books ever written. instead of being a sideline player, leverage the precious insights Hacking uncovered 6 presents to aid your self, your organization, and your kingdom struggle cyber-crime.

Information Security: The Complete Reference, Second Edition

Enhance and enforce a good end-to-end protection application Today’s advanced international of cellular structures, cloud computing, and ubiquitous information entry places new safety calls for on each IT specialist. details protection: the entire Reference, moment version (previously titled community protection: the total Reference) is the single finished publication that gives vendor-neutral info on all points of knowledge safety, with a watch towards the evolving risk panorama.

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

State of the art concepts for locating and solving severe protection flaws toughen your community and evade electronic disaster with confirmed techniques from a group of safety specialists. thoroughly up-to-date and that includes 12 new chapters, grey Hat Hacking: the moral Hacker's instruction manual, Fourth version explains the enemy’s present guns, abilities, and strategies and provides field-tested treatments, case reports, and ready-to-deploy checking out labs.

Additional resources for Hacking Exposed Linux: Linux Security Secrets and Solutions

Show sample text content

Instruments according to Hoare Logics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . instruments in response to version Checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . extra References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . precis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 498 499 499 502 504 505 507 512 515 515 517 518 519 520 520 521 ▼ 17 defense Tweaks within the Linux Kernel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523 Linux safeguard Modules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CryptoAPI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NetFilter improvements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . more advantageous instant Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . dossier procedure Enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . POSIX entry keep an eye on Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NFSv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . extra Kernel assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . guy Pages on-line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . on-line Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . different References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 524 525 525 525 526 526 526 526 526 527 Contents half V Appendixes ▼ A administration and upkeep .......................................... 531 top Practices Node Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Use Cryptographically Secured providers . . . . . . . . . . . . . . . . . . . . . . . Prevention opposed to Brute-Force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deny All, permit Specifically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . One-Time Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . computerized Scanning options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Lock Out on Too excessive Fail count number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . stay away from Loadable Kernel Module characteristic . . . . . . . . . . . . . . . . . . . . . . . . implement Password coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Use sudo for approach management initiatives . . . . . . . . . . . . . . . . . . . . . payment IPv6 prestige . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Justify Enabled Daemons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Set Mount and Filesystem concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . Harden a approach via /proc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . wellbeing and fitness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Checking Log documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . top Practices community atmosphere Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . Ingress and Egress Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . construct community Segments and Host-based Firewalls . . . . . . . . . . . . . practice Time Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Watch safety Mailing Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . acquire Log records at a vital position . . . . . . . . . . . . . . . . . . . . . . . . . . . . gather records in the community . . . . . . . . . . . . . . . . . . . . . . . . . . Use VPN for distant administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . extra precious instruments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intrusion Detection platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . procedure tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Download PDF sample

Rated 4.61 of 5 – based on 6 votes