MARC details
000 -LEADER |
fixed length control field |
04238cam a22002654a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231119104951.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
020906s2003 njua 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0130464562 (pbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BUL |
Transcribing agency |
BUL |
Modifying agency |
BUL |
Language of cataloging |
eng |
Description conventions |
rda |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
21 |
Item number |
TOX |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Toxen, Bob. |
245 10 - TITLE STATEMENT |
Title |
Real world Linux security : |
Remainder of title |
intrusion prevention, detection, and recovery / |
Statement of responsibility, etc. |
Bob Toxen. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd edition. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Upper Saddle River, NJ : |
Name of publisher, distributor, etc. |
Prentice Hall, |
Date of publication, distribution, etc. |
c2003. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxi, 810 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
Accompanying material |
1 CD-ROM (4 3/4 in.) |
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
Prentice Hall PTR open source technology series |
500 ## - GENERAL NOTE |
General note |
Chapter 1 Introduction<br/>1.1 introduction to the second edition<br/>1.2 who should read this book<br/>1.3 how this book is organized, etc<br/><br/>Part 1<br/>Securing your system<br/><br/>Chapter 2. Quick fixes for common problems<br/>2.1 understanding Linux security<br/>2.2 the seven most deadly sins<br/>2.3 passwords-A key point for good security, etc<br/><br/>Chapter 3. Quick and easy hacking and how to avoid it<br/>3.1 X marks the Hole<br/>3.2 law of the Jungle-physical security<br/>3.3 physical actions, etc<br/><br/>Chapter 4. Common Hacking by the subsystems <br/>4.1 NFS, mountd, and portmap<br/>4.2 sendmail <br/>4.3 Telnet, etc<br/><br/>Chapter 5. Common Hacker Attacks <br/>5.1 Rootkit attacks (script kiddies)<br/>5.2 packet spoofing explained<br/>5.3 SYN Flood Attack Explained, etc<br/><br/>Chapter 6. Advanced security issues<br/>6.1 configuring netscape for higher security<br/>6.2 stopping access to I/O devices<br/>6.3 scouting Out Apache (httpd) problems, etc<br/><br/>Chapter 7. Establishing security policies<br/>7.1 General policy<br/>7.2 personal use policy<br/>7.3 Accounts policy, etc<br/><br/>Chapter 8. Trusting other computers<br/>8.1 secure systems and insecure systems <br/>8.2 Trust no one-The highest security<br/>8.3 Linux and Unix systems within your control, etc<br/><br/>Chapter 9. Gusty Break-Ins <br/>9.1 Mission impossible techniques<br/>9.2 Spies<br/>9.3 Fanatics and suicide Attacks<br/><br/>Chapter 10. Case studies<br/>10.1 Confessions of a Berkeley system mole<br/>10.2 Knights of the realm (forensics)<br/>10.3 Ken Thompson cracks the Navy, etc<br/><br/>Chapter 11. Recent Break-Ins<br/>11.1 Fragmentation Attacks <br/>11.2 IP masquerading fails for ICMP<br/>11.3 The Ping of Death Sinks Dutch Shipping Company, etc<br/><br/>Part II Preparing for an intrusion<br/><br/>Chapter 12. Hardening your system<br/>12.1 protecting user sessions with SSH<br/>12.2 Virtual Private Networks (VPN)<br/>12.3 Pretty Good Privacy (PGP), ETC<br/><br/>Chapter 13. Preparing your hardware<br/>13.1 Timing Is Everything<br/>13.2 Advanced preparation<br/>13.3 Switch to Auxiliary control (Hot Backups), etc<br/><br/>Chapter 14. Preparing your configurations<br/>14.1 TCP wrappers<br/>14.2 Adaptive firewalls: Raising the Drawbridge with the cracker trap<br/>14.3 Ending cracker servers with a Kernel Mod, etc<br/><br/>Chapter 15. Scanning your system<br/>15.1 The nessus security scanner<br/>15.2 The SARA and SAINT security Auditors<br/>15.3 The nmap network mapper, etc<br/><br/>Part III Detecting an Intrusion <br/><br/>Chapter 16. Monitoring the Activity<br/>16.1 Log files<br/>16.2 log files: measures and countermeasures <br/>16.3 Using Logcheck to check log files you never check, etc<br/><br/>Chapter 17. Scanning your system for anomalies<br/>17.1 Finding suspicious files<br/>17.2 Tripwire<br/>17.3 Detecting deleted Executables, etc<br/><br/>Part IV Recovering from an Intrusion <br/><br/>Chapter 18. Regaining control of your system<br/>18.1 finding the crackers running process<br/>18.2 handling running cracker processes<br/>18.3 Drop the modems, networks, printers and systems, etc<br/><br/>Chapter 19. Finding and repairing the damage<br/>19.1 check your / var / log Logs<br/>19.2 The syslogd and klogd Daemons <br/>19.3 Interpreting log file entries, etc<br/><br/>Chapter 20. Finding the attacker's system<br/>20.1 Tracing a numeric IP Address with nslookup<br/>20.2 Tracing a numeric IP Address with dig<br/>20.3 who is a commie: Finding . com Owners, etc<br/><br/>Chapter 21. Having the Cracker crack Rocks <br/>21.1 police: Dragnet or keystone kops?<br/>21.2 prosecution <br/>21.3 Liability of ISPs allowing illegal activity, etc<br/><br/> <br/> |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Index : p. 795-810<br/> |
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Linux. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Operating systems (Computers) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Book Open Access |
Edition |
2nd edition. |
Classification part |
005.8 |
Item part |
1 |
Call number prefix |
TOX |
Call number suffix |
005.8 TOX |