
|
|
UNIX
White Hat Hacker Handbook
Accessing and Repairing UNIX Security Vulnerabilities
Author TBD
ISBN xxx
Retail
Price $16.95
/ £10.95
Dimensions: 9"
x 7"
Page count: 200
-Order now and get 30% off
the retail price!
-You also receive the online access to the
code depot!
Only $9.95
Order Now!
|
This unique book focuses on the detection and correction of UNIX
security vulnerabilities. UNIX is not exempt from attack and even
the most savvy UNIX System Administrator can be fooled by
sophisticated rootkit attacks. These unobtrusive attacks can
remain undetected for years while the hacker steals
mission-critical business information from the database and
server.
This is an indispensable book for every UNIX administrator and is
packed with techniques and tricks to outsmart even the most
sophisticated attacker. All UNIX professionals should learn White
Hat security help lock-out intruders and keep your system safe
from attack.
The most important thing to keep in mind is that by the time you
notice strange system behavior like this, it is already too late,
and a great deal of effort will be required to clean up after the
intrusion, including reinstalling the operating system.
For this reason, it is critical to take a preventative approach to
security. Periodic attention to the security of your system,
including updates from your operating system vendor and regular
security checkups, could save you from extended downtime on your
mission-critical systems to clean up an intrusion.
|
|
* Learn how
rootkit's are used to invade your server.
* See real-world techniques for detecting intrusions.
* Access any UNIX system for security vulnerabilities.
* Protect your server from malicious attackers.
* Conduct a security review of any UNIX system. |
About the Author:
Table of Contents: Chapter
1 - Overview of UNIX security
Chapter 2 - Starting an attack
Chapter 3 - Replacing UNIX commands Chapter 4 -
Detecting Trojan horses Chapter 5 - Using sniffers and daemon
processes to steal passwords
Chapter 6 - Accessing UNIX security Vulnerabilities
Chapter 7 - Cleaning-up after an attack
|
|