WhenPractical UNIX Securitywas first published in 1991, it became an instant classic. Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.
This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.
If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.
Practical UNIX & Internet Securitydescribes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings,Practical UNIX & Internet Securitytells you everything you need to know to make your UNIX system as secure as it possible can be.
Contents include:
Practical Unix & Internet Security 2/E
A guide to the operating system's practical applications covers listing, finding, displaying, printing, security, editing, Emacs, and writing Bourne Shell Scripts and Perl programs
Whether a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tells users what they need to know.
Albitz, Paul, Matt Larson, and Cricket Liu. DNS on Windows NT. Sebastopol, CA: O'Reilly and Associates, 1998. This version of the book provides an explanation of the details of how Internet name service works on Windows NT.
This book presents the historical context of the work to date on usable security and privacy, creates a taxonomy for organizing that work, outlines current research objectives, presents lessons learned, and makes suggestions for future ...
This edition has been completely updated for OpenBSD 5.3, including new coverage of OpenBSD's boot system, security features like W^X and ProPolice, and advanced networking techniques.
Contents PART I : Foreword Preface Understanding Hackers The Hacking Environment XV xix 1 1 Historic Perspective Hacker or Cracker CHAPTER 1 : Who Hackers Are Internal Hackers 2 3 5 5 External Hackers Categorizing Hackers Demographics ...
Security consultant Linda McCarthy shows how breaches occurred, what steps were taken to deal with them - and how well they worked, what steps could have been taken to prevent...
Filling the need for a single source that introduces all the important network security areas from a practical perspective, this volume covers technical issues, such as defenses against software attacks by system crackers, as well as ...
This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is ...