Securing & Optimizing Linux: The Hacking Solution


Securing & Optimizing Linux: The Hacking Solution Securing & Optimizing Linux: The Hacking Solution by Gerhard Mourani By * Publisher: Open Network Architecture * Number Of Pages: 1208 * Publication Date: 2002-06-26 * Sales Rank: 1314966 * ISBN / ASIN: 0968879314 * EAN: 9780968879313 * Binding: Paperback * Manufacturer: Open Network Architecture * Studio: Open Network Architecture * Average Rating: 4 * Total Reviews: 3 Book Description: This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network. The book provides through its 47 chapters, a comprehensive collection of Linux security products and explains in the most simple and structured manner how to safely and easily configure and run many popular Linux-based applications and services, including Exim, Qmail, Apache 2, DHCP, Anti-Virus, Anti-Spam, Anti-Relaying, ProFTPD, and many others. The author of the book relentlessy searches and document new hacking solutions to bring you in this manual the most up-to-date security developments. Date: 2006-10-07 Rating: 5 Review: great book on linux This is far the greatest linux book that I have read. I used this book for 4 yrs, eventhough i spill water on it, i did recover it and still used it. I hope GM can create a new book for the new linux distros like this. Date: 2004-08-25 Rating: 2 Review: Get a grammar checker The great content is marred by countless grammatical foibles which make the book nearly unreadable. Here's an example: "By default denying access to every one, is the first step of a reliable security policy. In this way we eliminate the possibility of forgetting someone or to making a mistake.

http://rapidshare.com/files/52756863/securing-optimizing-linux-the-hacking-solution.rar__1c59b56__via_gigapedia.info__.html


Password: gigapedia.org

free counters

Followers