책 이미지

eBook 미리보기
책 정보
· 제목 : Linux (Hacking Exposed) (Paperback, 1st) 
· 분류 : 외국도서 > 컴퓨터 > 운영체제(OS) > 일반
· ISBN : 9780072127737
· 쪽수 : 600쪽
· 출판일 : 2001-03-27
· 분류 : 외국도서 > 컴퓨터 > 운영체제(OS) > 일반
· ISBN : 9780072127737
· 쪽수 : 600쪽
· 출판일 : 2001-03-27
목차
Part I: Locking Into Linux.
Chapter 1: Linux Security Overview.
Chapter 2: Proactive Measures and Recovering from a Break-In.
Chapter 3: Mapping Your Machine and Network.
Part II: Getting in from the Outside.
Chapter 4: Social Engineering, Trojans, and Other Hacker Trickery.
Chapter 5: Physical Attacks.
Chapter 6: Attacking Over the Network.
Chapter 7: Abusing the Network Itself.
Part III: Local User Attacks.
Chapter 8: Elevating User Privileges.
Chapter 9: Password Cracking.
Chapter 10: How Hackers Maintain Access.
Part IV: Server Issues.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Chapter 2: Proactive Measures and Recovering from a Break-In.
Chapter 3: Mapping Your Machine and Network.
Part II: Getting in from the Outside.
Chapter 4: Social Engineering, Trojans, and Other Hacker Trickery.
Chapter 5: Physical Attacks.
Chapter 6: Attacking Over the Network.
Chapter 7: Abusing the Network Itself.
Part III: Local User Attacks.
Chapter 8: Elevating User Privileges.
Chapter 9: Password Cracking.
Chapter 10: How Hackers Maintain Access.
Part IV: Server Issues.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Part II: Getting in from the Outside.
Chapter 4: Social Engineering, Trojans, and Other Hacker Trickery.
Chapter 5: Physical Attacks.
Chapter 6: Attacking Over the Network.
Chapter 7: Abusing the Network Itself.
Part III: Local User Attacks.
Chapter 8: Elevating User Privileges.
Chapter 9: Password Cracking.
Chapter 10: How Hackers Maintain Access.
Part IV: Server Issues.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Chapter 5: Physical Attacks.
Chapter 6: Attacking Over the Network.
Chapter 7: Abusing the Network Itself.
Part III: Local User Attacks.
Chapter 8: Elevating User Privileges.
Chapter 9: Password Cracking.
Chapter 10: How Hackers Maintain Access.
Part IV: Server Issues.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Chapter 7: Abusing the Network Itself.
Part III: Local User Attacks.
Chapter 8: Elevating User Privileges.
Chapter 9: Password Cracking.
Chapter 10: How Hackers Maintain Access.
Part IV: Server Issues.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Chapter 8: Elevating User Privileges.
Chapter 9: Password Cracking.
Chapter 10: How Hackers Maintain Access.
Part IV: Server Issues.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Chapter 10: How Hackers Maintain Access.
Part IV: Server Issues.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Chapter 11: Mail and FTP Security.
Chapter 12: Web Servers and Dynamic Content.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Chapter 13: Access Control and Firewalls.
Part V: Appendices.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Appendix A: Keeping Your Programs Current.
Appendix B: Turning Off Unneeded Services.
Appendix C: Online Resources.
Appendix D: Case Studies.
Appendix C: Online Resources.
Appendix D: Case Studies.
추천도서
분야의 베스트셀러 >