User Disclaimer and Agreements

This blog is maintained for the personal use of the author, with the intention of creating a list of bookmarks of free audio-books, comics, e-books, games, magazine, music, series, softwares, tutorials and other materials available on the net therefore neither you can't sell, nor use it for any commercial purposes. The author of this blog respects the copyright law and did not upload any of those you find here. We just collects (by using google and other search engines) link(s) hosted or posted by other server/people. The creator of this page or the ISP(s) hosting any content on this site take no responsibility for the way you use the information provided on this site. These audio-books, e-books, magazine, softwares, tutorials etc here are for educational purposes only and SHOULD BE VIEWED ONLY. If you download any files to view them, you are agreeing to delete them within a 24 hour period. It is strictly recommended to buy the products from the original owner/publisher of the products. The link(s) will be removed as soon as any complaint received from the original publisher/author of any material is published herein. Wish you have a good education.

Friday, November 7, 2008

Hacking Exposed Linux


Hacking Exposed Linux (Hacking Exposed)
By ISECOM


Publisher: McGraw-Hill Osborne Media
Number Of Pages: 813
Publication Date: 2008-07-15
ISBN-10/ ASIN: 0072262575
ISBN-13/ EAN: 9780072262575

The Latest Linux Security Solutions

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

* Secure Linux by using attacks and countermeasures from the latest OSSTMM research
* Follow attack techniques of PSTN, ISDN, and PSDN over Linux
* Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
* Block Linux signal jamming, cloning, and eavesdropping attacks
* Apply Trusted Computing and cryptography tools for your best defense
* Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
* Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
* Find and repair errors in C code with static analysis and Hoare Logic

Download

No comments: