undrgrnd Cliquez ici Toys NEWNEEEW nav-sa-clothing-shoes Cloud Drive Photos FIFA16 cliquez_ici Shop Fire HD 6 Shop Kindle Paperwhite cliquez_ici Jeux Vidéo
Acheter d'occasion
EUR 5,97
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par -betterworldbooks-
État: D'occasion: Très bon
Commentaire: Expedier des Etats-Unis. Distribution privu en 2-3 semaines. Nous proposons la communication par e-mail en francais. Ancien livre de bibliothèque. Peut contenir des étiquettes « de bibliothèque » Condition très bonne pour un livre d'occasion. Usure minime. Sous garantie de remboursement complet. Plus de plus d'un million clients satisfaits! Votre alphabétisation dans le monde achat avantages!
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir cette image

Hack Proofing Linux: A Guide to Open Source Security (Anglais) Broché – 6 juillet 2001

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 36,15 EUR 5,97

Livres anglais et étrangers
Lisez en version originale. Cliquez ici

Offres spéciales et liens associés

Descriptions du produit

Revue de presse

"... I like this book. It would be a good textbook to use with a one-week Linux security workshop" -- Information Security Bulletin

Détails sur le produit

Dans ce livre

(En savoir plus)
Première phrase
In spite of the ups and downs of the dot-com industry, open source software has become a viable alternative to commercial companies such as Microsoft, Sun, and IBM. Lire la première page
En découvrir plus
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 7 commentaires
8 internautes sur 8 ont trouvé ce commentaire utile 
An overly ambitious book with some technical inaccuracies 22 octobre 2001
Par Richard Bejtlich - Publié sur Amazon.com
Format: Broché
I am a senior engineer for network security operations. I am not a Linux expert, nor do I have experience using all of the tools included in "Hack Proofing Linux" (HPL). Unfortunately, I don't believe HPL was written by experts either; few have knowledge spanning the entire open source security arena. By venturing beyond the authors' core expertise, HPL offers some incorrect information. If you accept these limitations, HPL still introduces an impressive array of Linux security applications.

The deployment of Linux antivirus solutions is HPL's first example of questionable material. The authors seem to think products like AntiVir exist to protect Linux hosts. Actually, Linux-hosted anti-virus solutions primarily screen email traffic for Windows-based malicious logic. Finding a "VBS.FreeLink" virus on a Microsoft-based CD-ROM, mounted on a Linux system, doesn't qualify as protecting the Linux operating system. (See p. 123 for this example.)

The second sample of questionable material involves discussions of the nmap port scanner. Chapter 3 doesn't provide accurate information on the tool's options. On p. 136, "-s" doesn't mean "stealth" in all cases. P. 137 provides this puzzle: "-sS uses the SYN feature of TCP... even if the remote computer doesn't want to communicate with your host, NMAP is still able to gather sufficient information from this scan to learn the open ports." On p. 140, we should hear that specifying "ME" in a decoy scan indicates where to place your true source IP; it doesn't "increase the likelihood that your system will be hidden from IDS logs." P. 142 incorrectly says -sS "helps the scan get past firewalls, which often filter out initial SYN packets." Material like this seems like speculation or misinterpretation, not sound advice.

Beyond technical inaccuracies, I believe HPL is more about installation of tools and less about operational use. Knowing how to install Snort with database support is significant. Having the ability to configure the ruleset, interpret the alerts, and operationalize the system is far more important. That level of detail deserves a separate book, not several pages in a single chapter.

Still, I haven't seen another book which covers so many open source security tools. You'll find instructions for installing GPG, nmap, Nessus, Tripwire, TCPDump, Ethereal, EtherApe, OpenSSH, Squid -- the list goes on. Beyond verifying the material I believed was inaccurate, I skimmed much of these installation and basic usage instructions. Should someone need help deploying one of these tools, HPL will probably be useful. Just be sure to verify the material against the documentation provided by the application's authors.

(Disclaimer: I received a free review copy from the publisher.)
4 internautes sur 4 ont trouvé ce commentaire utile 
Old News 21 septembre 2005
Par Amazon Customer - Publié sur Amazon.com
Format: Broché
Don't waste your money on this book, unless you want to go back to older versions of Linux...

Many of the links are gone, many of the programs don't work with the newer versions of Linux (post 2004), and buying this book in September 2005 was basically flushing nearly $50 down the toilet...
3 internautes sur 4 ont trouvé ce commentaire utile 
Hack Proofing Linux: A great guide to Open Source Security 22 novembre 2001
Par C.E. Tapie Rohm Jr., Ph.D. - Publié sur Amazon.com
Format: Broché
Hack Proofing Linux does the following very accurately:
1. It shows you how to deploy IPsec using FreeSWAN.
2. Readers learn detailed information about how to configure packet filters and proxy servers.
3. Although many theoretical references exist, few resources have practical advice concerning how to implement Kerberos. Before publication of this book, no authors had the common sense to show all of the steps necessary for a practical implementation. Other references either omitted steps or simply remained on a general level. I've never seen a book that does such as good job on this, in such a handy way.
4. After reading this book, you will have more than enough accurate information to scan systems for vulnerabilities, and you will also be able to accurately map and manage networks. For those who need more explanation, all they have to do is implement the tools as described, and they can then actually learn by doing. Seeing as how most of these people can't even buy or read the book all the way through, no matter they are impatient with a practical approach.
5. The book focuses on the pliability of Linux. Do you want to use a Linux server as a firewall? Read this book. Do you want to use it to audit systems? Read this book. Do you want to use Linux to securely centralize authentication? Read this book. Even though this book doesn't appear to be popular to people in Texas who don't understand that a mount point can be any directory on a Linux system, or who don't realize that Xinetd is a defacto standard, this California professor thinks it does an
excellent job.
3 internautes sur 4 ont trouvé ce commentaire utile 
2 months into Linux and found the perfect book 4 mars 2002
Par ++--static--++ - Publié sur Amazon.com
Format: Broché
This book starts off by defining the Open Source Movement and the General Public License. It then moves on to everything else...
As a newbie (2 months of using the free download of Mandrake 8.1 after doing the free online course...and 5 months of basic networking skills), I found this book an excellent read. It covered almost everything I needed to know to secure my network at home (I don't use windows anymore), and gave me confidence enough to want to apply for Network Administration somewhere.
CD included, you get tricks for locking down your system, or your whole network even, and the apps to help you do it (the entire book is in HTML on the CD, too!) I recommend this book to anyone wanting to learn linux, or anyone wanting to learn linux security.
I took half a star because it mainly refers to Red Hat Linux over others, and another half because I could see how a college professor might want a much more technical manual over this textbook style guide. Great book!
I never got the book! 18 janvier 2013
Par VeritasAequitas - Publié sur Amazon.com
Format: Broché Achat vérifié
I was just going through product ratings and realized that I had never gotten this book in the mail!! I can't believe it! Because I obviously bought awhile ago and forgot I did, there's nothing I can do about it now besides buy ANOTHER one and HOPE I get it this time! -Gee Whiz.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?