Real world Linux security : (Record no. 126)

MARC details
000 -LEADER
fixed length control field 04238cam a22002654a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231119104951.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 020906s2003 njua 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0130464562 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging eng
Description conventions rda
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 21
Item number TOX
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Toxen, Bob.
245 10 - TITLE STATEMENT
Title Real world Linux security :
Remainder of title intrusion prevention, detection, and recovery /
Statement of responsibility, etc. Bob Toxen.
250 ## - EDITION STATEMENT
Edition statement 2nd edition.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, NJ :
Name of publisher, distributor, etc. Prentice Hall,
Date of publication, distribution, etc. c2003.
300 ## - PHYSICAL DESCRIPTION
Extent xxxi, 810 p. :
Other physical details ill. ;
Dimensions 24 cm.
Accompanying material 1 CD-ROM (4 3/4 in.)
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Prentice Hall PTR open source technology series
500 ## - GENERAL NOTE
General note Chapter 1 Introduction<br/>1.1 introduction to the second edition<br/>1.2 who should read this book<br/>1.3 how this book is organized, etc<br/><br/>Part 1<br/>Securing your system<br/><br/>Chapter 2. Quick fixes for common problems<br/>2.1 understanding Linux security<br/>2.2 the seven most deadly sins<br/>2.3 passwords-A key point for good security, etc<br/><br/>Chapter 3. Quick and easy hacking and how to avoid it<br/>3.1 X marks the Hole<br/>3.2 law of the Jungle-physical security<br/>3.3 physical actions, etc<br/><br/>Chapter 4. Common Hacking by the subsystems <br/>4.1 NFS, mountd, and portmap<br/>4.2 sendmail <br/>4.3 Telnet, etc<br/><br/>Chapter 5. Common Hacker Attacks <br/>5.1 Rootkit attacks (script kiddies)<br/>5.2 packet spoofing explained<br/>5.3 SYN Flood Attack Explained, etc<br/><br/>Chapter 6. Advanced security issues<br/>6.1 configuring netscape for higher security<br/>6.2 stopping access to I/O devices<br/>6.3 scouting Out Apache (httpd) problems, etc<br/><br/>Chapter 7. Establishing security policies<br/>7.1 General policy<br/>7.2 personal use policy<br/>7.3 Accounts policy, etc<br/><br/>Chapter 8. Trusting other computers<br/>8.1 secure systems and insecure systems <br/>8.2 Trust no one-The highest security<br/>8.3 Linux and Unix systems within your control, etc<br/><br/>Chapter 9. Gusty Break-Ins <br/>9.1 Mission impossible techniques<br/>9.2 Spies<br/>9.3 Fanatics and suicide Attacks<br/><br/>Chapter 10. Case studies<br/>10.1 Confessions of a Berkeley system mole<br/>10.2 Knights of the realm (forensics)<br/>10.3 Ken Thompson cracks the Navy, etc<br/><br/>Chapter 11. Recent Break-Ins<br/>11.1 Fragmentation Attacks <br/>11.2 IP masquerading fails for ICMP<br/>11.3 The Ping of Death Sinks Dutch Shipping Company, etc<br/><br/>Part II Preparing for an intrusion<br/><br/>Chapter 12. Hardening your system<br/>12.1 protecting user sessions with SSH<br/>12.2 Virtual Private Networks (VPN)<br/>12.3 Pretty Good Privacy (PGP), ETC<br/><br/>Chapter 13. Preparing your hardware<br/>13.1 Timing Is Everything<br/>13.2 Advanced preparation<br/>13.3 Switch to Auxiliary control (Hot Backups), etc<br/><br/>Chapter 14. Preparing your configurations<br/>14.1 TCP wrappers<br/>14.2 Adaptive firewalls: Raising the Drawbridge with the cracker trap<br/>14.3 Ending cracker servers with a Kernel Mod, etc<br/><br/>Chapter 15. Scanning your system<br/>15.1 The nessus security scanner<br/>15.2 The SARA and SAINT security Auditors<br/>15.3 The nmap network mapper, etc<br/><br/>Part III Detecting an Intrusion <br/><br/>Chapter 16. Monitoring the Activity<br/>16.1 Log files<br/>16.2 log files: measures and countermeasures <br/>16.3 Using Logcheck to check log files you never check, etc<br/><br/>Chapter 17. Scanning your system for anomalies<br/>17.1 Finding suspicious files<br/>17.2 Tripwire<br/>17.3 Detecting deleted Executables, etc<br/><br/>Part IV Recovering from an Intrusion <br/><br/>Chapter 18. Regaining control of your system<br/>18.1 finding the crackers running process<br/>18.2 handling running cracker processes<br/>18.3 Drop the modems, networks, printers and systems, etc<br/><br/>Chapter 19. Finding and repairing the damage<br/>19.1 check your / var / log Logs<br/>19.2 The syslogd and klogd Daemons <br/>19.3 Interpreting log file entries, etc<br/><br/>Chapter 20. Finding the attacker's system<br/>20.1 Tracing a numeric IP Address with nslookup<br/>20.2 Tracing a numeric IP Address with dig<br/>20.3 who is a commie: Finding . com Owners, etc<br/><br/>Chapter 21. Having the Cracker crack Rocks <br/>21.1 police: Dragnet or keystone kops?<br/>21.2 prosecution <br/>21.3 Liability of ISPs allowing illegal activity, etc<br/><br/> <br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Index : p. 795-810<br/>
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Linux.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Operating systems (Computers)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Open Access
Edition 2nd edition.
Classification part 005.8
Item part 1
Call number prefix TOX
Call number suffix 005.8 TOX
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 01/22/2021 PURCHASED 0010493   005.8 TOX. 1 BUML23112249 01/22/2021 1 01/22/2021 Book Open Access