Oracle Consulting Oracle Training Oracle Support Development
Oracle Books
SQL Server Books
IT Books
Job Interview Books
Rampant Horse Books
911 Series
Pedagogue Books

Oracle Software
Write for Rampant
Publish with Rampant
Rampant News
Rampant Authors
Rampant Staff
Oracle News
Oracle Forum
Oracle Tips
Articles by our Authors
Press Releases
SQL Server Books

Oracle 11g Books

Oracle tuning

Oracle training

Oracle support

Remote Oracle


Privacy Policy



  UNIX White Hat Hacker Handbook
Accessing and Repairing UNIX Security Vulnerabilities

Author TBD
ISBN xxx
Retail Price $16.95 /  £10.95
Dimensions: 9" x 7"
Page count: 200

-Order now and get 30% off the retail price!
-You also receive the online access to the code depot!

Only $9.95

Order Now!


This unique book focuses on the detection and correction of UNIX security vulnerabilities. UNIX is not exempt from attack and even the most savvy UNIX System Administrator can be fooled by sophisticated rootkit attacks. These unobtrusive attacks can remain undetected for years while the hacker steals mission-critical business information from the database and server.

This is an indispensable book for every UNIX administrator and is packed with techniques and tricks to outsmart even the most sophisticated attacker. All UNIX professionals should learn White Hat security help lock-out intruders and keep your system safe from attack.

The most important thing to keep in mind is that by the time you notice strange system behavior like this, it is already too late, and a great deal of effort will be required to clean up after the intrusion, including reinstalling the operating system.

For this reason, it is critical to take a preventative approach to security. Periodic attention to the security of your system, including updates from your operating system vendor and regular security checkups, could save you from extended downtime on your mission-critical systems to clean up an intrusion.

Key Features

* Learn how rootkit's are used to invade your server.

* See real-world techniques for detecting intrusions.

* Access any UNIX system for security vulnerabilities.

* Protect your server from malicious attackers.

* Conduct a security review of any UNIX system.


About the Author:

Author Name

Table of Contents:

Chapter 1 - Overview of UNIX security

Chapter 2 - Starting an attack

Chapter 3 - Replacing UNIX commands

Chapter 4 -  Detecting Trojan horses

Chapter 5 - Using sniffers and daemon processes to steal passwords

Chapter 6 -  Accessing UNIX security Vulnerabilities

Chapter 7 - Cleaning-up after an attack




 Copyright © 1996 -2017 by Burleson. All rights reserved.

Oracle® is the registered trademark of Oracle Corporation. SQL Server® is the registered trademark of Microsoft Corporation. 
Many of the designations used by computer vendors to distinguish their products are claimed as Trademarks