Hacking Linux Exposed

Hacking Linux Exposed PDF

Author: Brian Hatch

Publisher: McGraw-Hill/Osborne Media

Published: 2003

Total Pages: 746

ISBN-13: 9780072225648

DOWNLOAD EBOOK →

From the publisher of the international bestseller, "Hacking Exposed: Network Security Secrets & Solutions, " comes this must-have security handbook for anyone running Linux. This up-to-date edition shows how to think like a Linux hacker in order to beat the Linux hacker.

Hacking Exposed Linux

Hacking Exposed Linux PDF

Author: ISECOM

Publisher: McGraw Hill Professional

Published: 2007-08-22

Total Pages: 650

ISBN-13: 0071596429

DOWNLOAD EBOOK →

The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research Follow attack techniques of PSTN, ISDN, and PSDN over Linux Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux Block Linux signal jamming, cloning, and eavesdropping attacks Apply Trusted Computing and cryptography tools for your best defense Fix vulnerabilities in DNS, SMTP, and Web 2.0 services Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits Find and repair errors in C code with static analysis and Hoare Logic

Hacking Exposed Wireless

Hacking Exposed Wireless PDF

Author: Johnny Cache

Publisher: McGraw Hill Professional

Published: 2007-04-10

Total Pages: 418

ISBN-13: 0071509690

DOWNLOAD EBOOK →

Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

Linux Server Security

Linux Server Security PDF

Author: Chris Binnie

Publisher: John Wiley & Sons

Published: 2016-05-16

Total Pages: 144

ISBN-13: 1119277655

DOWNLOAD EBOOK →

Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker’s tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems. Master hacking tools and launch sophisticated attacks: perform SQL injections, deploy multiple server exploits and crack complex passwords. Defend systems and networks: make your servers invisible, be confident of your security with penetration testing and repel unwelcome attackers. Increase your background knowledge of attacks on systems and networks and improve all-important practical skills required to secure any Linux server. The techniques presented apply to almost all Linux distributions including the many Debian and Red Hat derivatives and some other Unix-type systems. Further your career with this intriguing, deeply insightful, must-have technical book. Diverse, broadly-applicable and hands-on practical, Linux Server Security: Hack and Defend is an essential resource which will sit proudly on any techie's bookshelf.

Hacking Exposed Mobile

Hacking Exposed Mobile PDF

Author: Neil Bergman

Publisher: McGraw Hill Professional

Published: 2013-08-05

Total Pages: 320

ISBN-13: 0071817026

DOWNLOAD EBOOK →

Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists

Hacking Exposed Linux 3E

Hacking Exposed Linux 3E PDF

Author: Isecom

Publisher: Tata McGraw-Hill Education

Published: 2008

Total Pages: 0

ISBN-13: 9780070187726

DOWNLOAD EBOOK →

This authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. The book is based on the latest ISECOM security research and shows, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.

Hacking Exposed

Hacking Exposed PDF

Author: Joel Scambray

Publisher: McGraw-Hill/Osborne Media

Published: 2003

Total Pages: 448

ISBN-13: 9780072230611

DOWNLOAD EBOOK →

Provides coverage of the security features in Windows Server 2003. This book is useful for network professionals working with a Windows Server 2003 and/or Windows XP system.

Hacking Exposed

Hacking Exposed PDF

Author: Joel Scambray

Publisher: McGraw-Hill/Osborne Media

Published: 2002

Total Pages: 420

ISBN-13: 9780072224382

DOWNLOAD EBOOK →

Featuring in-depth coverage of the technology platforms surrounding Web applications and Web attacks, this guide has specific case studies in the popular "Hacking Exposed" format.

Linux and UNIX Security Portable Reference

Linux and UNIX Security Portable Reference PDF

Author: Nitesh Dhanjani

Publisher: McGraw Hill Professional

Published: 2003

Total Pages: 258

ISBN-13: 9780072227864

DOWNLOAD EBOOK →

Safeguard your systems from all types of hackers, hijackers, and predators with help from author and consultant Konstantin Matev.