Loading....

Tuesday, November 4, 2008

Hacking Exposed Linux

untitled

                                         Release Notes

Based on the new Linux 2.6 kernel, this edition is written from scratch by a
global team of open source Linux security experts. Hacking Exposed Linux, Third Edition reveals brand-new Linux attacks, countermeasures, and case studies. The book is platform independent, so you will be able to learn how to secure any version of Linux that you are running
.

 

Table Of Contents

 

Pt. I Security and Controls
1 Applying Security 3
2 Applying Interactive Controls 13
3 Applying Process Controls 27
Pt. II Hacking the System
4 Local Access Control 41
5 Data Networks Security 87
6 Unconventional Data Attack Vectors 123
7 Voice over IP 179
8 Wireless Networks 215
9 Input/Output devices 281
10 RFID - Radio Frequency Identification 295
11 Emanation Attacks 321
12 Trusted Computing 331
Pt. III Hacking the Users
13 Web Application Hacking 365
14 Mail Services 429
15 Name Services 469
Pt. IV Care and Maintenance
16 Reliability: Static Analysis of C Code 495
17 Security Tweaks in the Linux Kernel 523

 

0 comments: