本文主要是介绍Hacking Exposed Linux,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.csdn.net/topmvp - topmvpThe Latest Linux Security Solutions
This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.
*Secure Linux by using attacks and countermeasures from the latest OSSTMM research*Follow attack techniques of PSTN, ISDN, and PSDN over Linux
*Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux
*Block Linux signal jamming, cloning, and eavesdropping attacks
*Apply Trusted Computing and cryptography tools for your best defense
*Fix vulnerabilities in DNS, SMTP, and Web 2.0 services
*Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits
*Find and repair errors in C code with static analysis and Hoare Logic
http://rapidshare.com/files/164516396/0072262575.rar
http://depositfiles.com/files/1rpqblc9i
这篇关于Hacking Exposed Linux的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!