HackNotes Linux and Unix Security Portable Reference Paperback – 1 Jul 2003
Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.
To get the free app, enter your mobile phone number.
From the Back Cover
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!
- Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
- Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
- Protect against privilege escalation attacks
- Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
- Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
- Learn in-depth and current Linux and Unix system hardening guidelines
- Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
- Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
- Understand the latest wireless (802.11) hacking techniques, tools, and defenses
About the Author
Nitesh Dhanjani (Belleview, WA) is an information systems security consultant for Foundstone. He has had over 6 years of experience with system administration and information security. Prior to joining Foundstone's team, Nitesh was involved with the development of various Linux loadable kernel modules. He continues to be active with systems programming. Nitesh has also worked with Ernst & Young LLP where he performed various attack and penetration reviews for many significant companies in the IT arena. Nitesh graduated from Purdue University with both a Bachelors and Masters in Computer Science. While at Purdue, he was involved in numerous research projects with the CERIAS(Center for Education and Research in Information Assurance and Security) team. He also helped teach C and C++ courses. Mike Horton (Seattle, WA), series editor for the HackNotes[trademark] series, is an information systems security consultant for Foundstone, with an emphasis on secure system design, security architecture, operational security and ethical hacking. Prior to joining Foundstone, Mike was the Founder and Chief Technology Architect for Mercury Prime, a provider of secure real-time communication software. Previously, Mike was a senior consultant with Ernst & Young LLP where he was responsible for their ethical hacking and security architecture solutions services. Mike has performed numerous ethical hacking exercises for many significant companies in the IT and business arenas.
Top Customer Reviews
Most Helpful Customer Reviews on Amazon.com (beta)
At first glance, I wasnt sure how much material was presented. But after reading the first page or two, I realized the the purpose of the book, which is to give to-the-point information on topics such as enumeration, footprinting, remote hacking, privilege escalation, host hardening, etc. I have compared it to the other security books I already own, and this book seems to contain much more information in only about 200 pages! Since I am a sysadmin and have to travel a lot, I carry this book around with me in my laptop bag. I have only owned it for 2 days and have looked it up for reference material a bunch of times already. Good stuff. I highly recommend it, and watch out for the clever hacking techniques and goodies presented in the remote hacking chapter.
As a unix sysadmin I think this is one of those books that should go right next to the "Unix System Administration Handbook" on bookshelfs.
This is a must have book for people who cares or want to know more about security.
Since this is a hacking book, I disagree with the one review on here that complained about it not being complete. As far as the a&p techniques go, this book packs in more info than most 400+ hacking books I own. Saves a lot of desk real estate and also time. I really dont want to read 5 pages telling me what a portscan is, just tell me how to do it. I prefer it over the Hacking Exposed Linux book when I need quick and precise answers. This book helps me with just this. Right to the point, and some very cool techniques!
5 thumbs up.
Look for similar items by category
- Books > Computing & Internet > Certification > Subjects
- Books > Computing & Internet > Digital Lifestyle > Online Shopping > Amazon
- Books > Computing & Internet > Networking & Security > Network Topics
- Books > Computing & Internet > Networking & Security > Security
- Books > Computing & Internet > Programming > Linux & Unix
- Books > Computing & Internet > UNIX & Linux > Linux Distributions
- Books > Young Adult > Computers & Internet > General