StartseiteGruppenForumMehrZeitgeist
Web-Site durchsuchen
Diese Seite verwendet Cookies für unsere Dienste, zur Verbesserung unserer Leistungen, für Analytik und (falls Sie nicht eingeloggt sind) für Werbung. Indem Sie LibraryThing nutzen, erklären Sie dass Sie unsere Nutzungsbedingungen und Datenschutzrichtlinie gelesen und verstanden haben. Die Nutzung unserer Webseite und Dienste unterliegt diesen Richtlinien und Geschäftsbedingungen.

Ergebnisse von Google Books

Auf ein Miniaturbild klicken, um zu Google Books zu gelangen.

Lädt ...

Netzwerksicherheit Hacks

von Andrew Lockhart

Reihen: Hacks

MitgliederRezensionenBeliebtheitDurchschnittliche BewertungDiskussionen
2041132,642 (3.43)Keine
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Secur… (mehr)
Keine
Lädt ...

Melde dich bei LibraryThing an um herauszufinden, ob du dieses Buch mögen würdest.

Keine aktuelle Diskussion zu diesem Buch.

Indeholder "Credits", " About the Author", " Contributors", " Acknowledgments", "Preface", " Why Network Security Hacks?", " How This Book Is Organized", " Conventions Used in This Book", " Safari Enabled", " Using Code Examples", " How to Contact Us", " Got a Hack?", "Chapter 1. Unix Host Security", " 1. Secure Mount Points", " 2. Scan for SUID and SGID Programs", " 3. Scan for World- and Group-Writable Directories", " 4. Create Flexible Permissions Hierarchies with POSIX ACLs", " 5. Protect Your Logs from Tampering", " 6. Delegate Administrative Roles", " 7. Automate Cryptographic Signature Verification", " 8. Check for Listening Services", " 9. Prevent Services from Binding to an Interface", " 10. Restrict Services with Sandboxed Environments", " 11. Use proftpd with a MySQL Authentication Source", " 12. Prevent Stack-Smashing Attacks", " 13. Lock Down Your Kernel with grsecurity", " 14. Restrict Applications with grsecurity", " 15. Restrict System Calls with Systrace", " 16. Automated Systrace Policy Creation", " 17. Control Login Access with PAM", " 18. Restricted Shell Environments", " 19. Enforce User and Group Resource Limits", " 20. Automate System Updates", "Chapter 2. Windows Host Security", " 21. Check Servers for Applied Patches", " 22. Get a List of Open Files and Their Owning Processes", " 23. List Running Services and Open Ports", " 24. Enable Auditing", " 25. Secure Your Event Logs", " 26. Change Your Maximum Log File Sizes", " 27. Disable Default Shares", " 28. Encrypt Your Temp Folder", " 29. Clear the Paging File at Shutdown", " 30. Restrict Applications Available to Users", "Chapter 3. Network Security", " 31. Detect ARP Spoofing", " 32. Create a Static ARP Table", " 33. Firewall with Netfilter", " 34. Firewall with OpenBSD's PacketFilter", " 35. Create an Authenticated Gateway", " 36. Firewall with Windows", " 37. Keep Your Network Self-Contained", " 38. Test Your Firewall", " 39. MAC Filtering with Netfilter", " 40. Block OS Finterprinting", " 41. Fool Remote Operating System Detection Software", " 42. Keep an Inventory of Your Network", " 43. Scan Your Network for Vulnerabilities", " 44. Keep Server Clocks Synchronized", " 45. Create Your Own Certificate Authority", " 46. Distribute Your CA to Clients", " 47. Encrypt IMAP and POP with SSL", " 48. Set Up TLS-Enabled SMTP", " 49. Detect Ethernet Sniffers Remotely", " 50. Install Apache with SSL and suEXEC", " 51. Secure BIND", " 52. Secure MySQL", " 53. Share Files Securely in Unix", "Chapter 4. Logging", " 54. Run a Central Syslog Server", " 55. Steer Syslog", " 56. Integrate Windows into Your Syslog Infrastructure", " 57. Automatically Summarize Your Logs", " 58. Monitor Your Logs Automatically", " 59. Aggregate Logs from Remote Sites", " 60. Log User Activity with Process Accounting", "Chapter 5. Monitoring and Trending", " 61. Monitor Availability", " 62. Graph Trends", " 63. Run ntop for Real-Time Network Stats", " 64. Audit Network Traffic", " 65. Collect Statistics with Firewall Rules", " 66. Sniff the Ether Remotely", "Chapter 6. Secure Tunnels", " 67. Set Up IPsec Under Linux", " 68. Set Up IPsec Under FreeBSD", " 69. Set Up IPsec in OpenBSD", " 70. PPTP Tunneling", " 71. Opportunistic Encrypting with FreeS/WAN", " 72. Forward and Encrypt Traffic with SSH", " 73. Quick Logins with SSH Client Keys", " 74. Squid Proxy over SSH", " 75. Use SSH As a SOCKS Proxy", " 76. Encrypt and Tunnel Traffic with SSL", " 77. Tunnel Connections Inside HTTP", " 78. Tunnel with VTun and SSH", " 79. Automatic vtund.conf Generator", " 80. Create a Cross-Platform VPN", " 81. Tunnel PPP", "Chapter 7. Network Intrusion Detection", " 82. Detect Intrusions with Snort", " 83. Keep Track of Alerts", " 84. Real-Time Monitoring", " 85. Manage a Sensor Network", " 86. Write Your Own Snort Rules", " 87. Prevent and Contain Intrusions with Snort_inline", " 88. Automated Dynamic Firewalling with SnortSam", " 89. Detect Anomalous Behavior", " 90. Automatically Update Snort's Rules", " 91. Create a Distributed Stealth Sensor Network", " 92. Use Snort in High-Performance Environments with Barnyard", " 93. Detect and Prevent Web Application Intrusions", " 94. Simulate a Network of Vulnerable Hosts", " 95. Record Honeypot Activity", "Chapter 8. Recovery and Response", " 96. Image Mounted Filesystems", " 97. Verify File Integrity and Find Compromised Files", " 98. Find Compromised Packages with RPM", " 99. Scan for Rootkits", " 100. Find the Owner of a Network", "Index".

Glimrende bog, men der er kommet mindst en ny udgave af den. ( )
  bnielsen | Mar 6, 2016 |
keine Rezensionen | Rezension hinzufügen

Gehört zur Reihe

Du musst dich einloggen, um "Wissenswertes" zu bearbeiten.
Weitere Hilfe gibt es auf der "Wissenswertes"-Hilfe-Seite.
Gebräuchlichster Titel
Originaltitel
Alternative Titel
Ursprüngliches Erscheinungsdatum
Figuren/Charaktere
Wichtige Schauplätze
Wichtige Ereignisse
Zugehörige Filme
Epigraph (Motto/Zitat)
Widmung
Erste Worte
Zitate
Letzte Worte
Hinweis zur Identitätsklärung
Verlagslektoren
Werbezitate von
Originalsprache
Anerkannter DDC/MDS
Anerkannter LCC

Literaturhinweise zu diesem Werk aus externen Quellen.

Wikipedia auf Englisch (1)

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Secur

Keine Bibliotheksbeschreibungen gefunden.

Buchbeschreibung
Zusammenfassung in Haiku-Form

Aktuelle Diskussionen

Keine

Beliebte Umschlagbilder

Gespeicherte Links

Bewertung

Durchschnitt: (3.43)
0.5
1
1.5
2 1
2.5 1
3 6
3.5
4 6
4.5
5 1

Bist das du?

Werde ein LibraryThing-Autor.

 

Über uns | Kontakt/Impressum | LibraryThing.com | Datenschutz/Nutzungsbedingungen | Hilfe/FAQs | Blog | LT-Shop | APIs | TinyCat | Nachlassbibliotheken | Vorab-Rezensenten | Wissenswertes | 204,436,433 Bücher! | Menüleiste: Immer sichtbar