Check nearby libraries
Buy this book
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders - and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM research; Follow attack techniques of PSTN, ISDN, and PSDN over Linux; Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux; Block Linux signal jamming, cloning, and eavesdropping attacks; Apply Trusted Computing and cryptography tools for your best defense; Fix vulnerabilities in DNS, SMTP, and Web 2.0 services; Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits ; Find and repair errors in C code with static analysis and Hoare Logic.
Check nearby libraries
Buy this book
Previews available in: English
| Edition | Availability |
|---|---|
| 1 |
zzzz
|
|
2
Hacking Exposed Linux: Linux Security Secrets and Solutions
March 24, 2008, McGraw-Hill Osborne Media
Paperback
in English
- 3rd edition
0072262575 9780072262575
|
aaaa
|
Book Details
The Physical Object
Edition Identifiers
Work Identifiers
Source records
Community Reviews (0)
History
- Created April 30, 2008
- 12 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
| September 29, 2025 | Edited by yangka zonar | oclc and edition name |
| September 29, 2025 | Edited by yangka zonar | title, subtitle |
| July 1, 2019 | Edited by MARC Bot | replacing ocaid with lendable copy |
| September 14, 2017 | Edited by ImportBot | import new book |
| April 30, 2008 | Created by an anonymous user | Imported from amazon.com record |


