Linux security

Xem 1-20 trên 193 kết quả Linux security
  • As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security.

    pdf79p samsung_12 07-05-2013 24 5   Download

  • Linux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 15 of those years. In that brief time span, a student’s personal project has grown to where it now runs many computers throughout the world.

    pdf608p phongthinh 04-08-2009 389 205   Download

  • Tôi là một Fan của Linux, một người yêu thích Security. Tôi rất thích Linux, đặc biệt là khả năng tuyệt vời của nó. Tôi viết tài liệu này chỉ với mục đích muốn chia sẻ với mọi người một chút hiểu biết ít ỏi của tôi về Security Linux...Không hề có bất cứ mục đích nào khác. Những gì tôi chia sẻ trong tài liệu này đều có nguồn gốc từ các: Magazine, Book, Site, Forum, List...về Linux Security trên thế giới.

    pdf13p yukogaru1 03-08-2010 285 176   Download

  • Linux is a member of the large family of Unix-like operating systems. A relative newcomer experiencing sudden spectacular popularity starting in the late 1990s, Linux joins such wellknown commercial Unix operating systems as System V Release 4 (SVR4), developed by AT&T (now owned by the SCO Group); the 4.4 BSD release from the University of California at Berkeley (4.4BSD); Digital Unix from Digital Equipment Corporation (now Hewlett- Packard); AIX from IBM; HP-UX from Hewlett-Packard; Solaris from Sun Microsystems; and Mac OS X from Apple Computer, Inc....

    pdf829p vinhnghi 17-08-2009 143 87   Download

  • Internetworking security has become a very big issue in recent months. Companies who went through corporate life thinking, “it will never happen to me” suddenly found themselves the victim of some sort of attack on their network. High profile companies are most certainly a bigger target for several reasons, including the notoriety the hacker receives for damaging their network or Web site, and the amount of financial damage that can be done by bringing down a successful e-commerce site. Recent attacks easily racked up 100 million dollars in damage....

    pdf529p maiphuong 11-08-2009 324 84   Download

  • "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

    pdf405p vtva001 24-09-2010 231 73   Download

  • Several other mail transfer agents are available to replace sendmail. Two popular aternatives are Qmail (www.qmail.org) by David Bernstein, and Postfix (www.postfix.org) by Wietse Venema. Both of these MTAs were designed and written from the ground up with security and performance in mind. It is beyond the scope of this guide to give details on installing and configuring either of these alternatives, but a wealth of information is available on the Internet.

    pdf62p vuthuong 08-08-2009 141 65   Download

  • Tham khảo tài liệu 'bài thực hành: dịch vụ mạng linux', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p hoang92bn 08-12-2012 86 33   Download

  • Network security spans a large number of disciplines, ranging from management and policy topics to operating system kernel fundamentals. Historically, the coverage of these and the other network security areas was presented in multiple, specialized publications or given a high-level treatment that was not suited to the practitioner. Network Security Bible approaches network security from the view of the individual who wants to learn and apply the associated network security best practices without having to sort through a myriad of extraneous material from multiple sources.

    pdf697p vinhnghi 17-08-2009 113 30   Download

  • Linux Security Tóm tắt Lý thuyết: 10 tiết - Thực hành: 10 tiết. Mục tiêu Bài học giới thiệu các I. công cụ hỗ trợ cách II. thiết lập Firewall trên môi trường Linux như:

    pdf15p suatuoi_thomngon 31-07-2011 87 30   Download

  • Linux in a Nutshell Linux Network Administrator’s Guide Running Linux Linux Device Drivers Understanding the Linux Kernel Building Secure Servers with Linux LPI Linux Certification in a Nutshell Learning Red Hat Linux Linux Server HacksTM Linux Security Cookbook Managing RAID on Linux Linux Web Server CD Bookshelf Building Embedded Linux Systems

    pdf1064p shop_123 08-05-2013 48 20   Download

  • In the previous chapter, you learned about Linux processes. We discussed the init process, which is the grandparent of all other processes. We also discussed how to use init scripts to start and stop services on the system. In this chapter, we’re going to build upon this knowledge and go into depth about the Linux boot process. We’ll discuss the following topics: Managing the Linux Boot Process For your Linux+ exam, you need to have a sound understanding of how the Linux boot process works.

    pdf378p olicaxa1 07-09-2012 52 12   Download

  • Kernel Concepts The two different types of Linux kernel are: A: Monolithic A monolithic kernel is one which has support for all hardware, network, and filesystem compiled into a single image file. B: Modular A modular kernel is one which has some drivers compiled as object files, which the kernel can load and remove on demand. Loadable modules are kept in /lib/modules. The advantage of a modular kernel is that it doesn’t always need to be recompiled when hardware is added or replaced on the system.

    pdf150p lehungk44f4 10-09-2012 41 10   Download

  • Tôi là một Fan của Linux, một người yêu thích Security. Tôi rất thích Linux, đặc biệt là khả năng tuyệt vời của nó. Tôi viết tài liệu này chỉ với mục đích muốn chia sẻ với mọi người một chút hiểu biết ít ỏi của tôi về Security Linux...Không hề có bất cứ mục đích nào khác. Những gì tôi chia sẻ trong tài liệu này đều có nguồn gốc từ các: Magazine, Book, Site, Forum, List...về Linux Security trên thế giới.

    pdf14p transang1 27-09-2012 33 10   Download

  • Part 1 of the book serial ebook SELinux open source security enhanced linux to part 2 of you will continue to learn about relevant issues such as: Type enforcement, ancillary policy statements, customizing SELinux policies.

    pdf123p dienham63 12-12-2015 11 2   Download

  • Hướng dẫn thiết lập bảo mật trên hệ thống Linux. Tôi là một Fan của Linux, một người yêu thích Security. Tôi rất thích Linux, đặc biệt là khả năng tuyệt vời của nó. Tôi viết tài liệu này chỉ với mục đích muốn chia sẻ với mọi người một...

    pdf13p soncunglin 09-05-2009 972 646   Download

  • Hướng dẫn thiết lập bảo mật trên hệ thống Linux. Tôi là một Fan của Linux, một người yêu thích Security. Tôi rất thích Linux, đặc biệt là khả năng tuyệt vời của nó. Tôi viết tài liệu này.Có rất nhiều dịch vụ mạng truyền thống giao tiếp..

    pdf35p soncunglin 09-05-2009 1109 490   Download

  • LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple. Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are impossible with a switch.

    pdf361p vusuakhonghat 28-05-2009 530 251   Download

  • Tham khảo sách 'securing-optimizing-linux-rh-edition-v1.3', công nghệ thông tin, hệ điều hành phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf486p hanguyen 26-05-2009 135 73   Download

  • Welcome to the fascinating world of open source software that is Linux. In this book, I introduce you to the wonders of the Linux operating system, originally created as a labor of love by Linus Torvalds in the early 1990s. My goal is to initiate you into the rapidly growing ranks of Linux users and enthusiasts busily rewriting the rules for the operating system marketplace. If you’ve contemplated switching to Linux but find the prospect too forbidding, you can relax. If you can boil water or set your alarm clock, you, too, can become a Linux user. (No kidding!)...

    pdf459p vinhnghi 17-08-2009 137 69   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản