Linux security cookbook /

The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and muc...

Szczegółowa specyfikacja

Opis bibliograficzny
1. autor: Barrett, Daniel J. (autor)
Kolejni autorzy: Silverman, Richard E. (autor), Byrnes, Robert G. (autor)
Format: Książka
Język:English
Wydane: Sebastopol: O'Reilly, 2003.
Wydanie:Primera edición.
Hasła przedmiotowe:

MARC

LEADER 00000cam a2200000 i 4500
003 Ucuenca
005 20230308182538.0
006 a||||fr|||| 001 0
007 ta
008 010121t2003 xxu fr|||| 001|||eng|a
999 |c 60057  |d 60057 
020 |a 0-596-00391-9 
040 |a UCuenca-cdrjbv  |b spa  |c UCuenca  |e rda 
041 0 |a eng 
082 0 |2 22  |a 005.4447 6  |c 108440 
100 1 |a Barrett, Daniel J.  |e autor  |9 100199 
245 0 0 |a Linux security cookbook /   |c Daniel J. Barrett, Richard E. Silverman y Robert G. Byrnes. 
250 |a Primera edición. 
264 1 |a Sebastopol:   |b O'Reilly,   |c 2003. 
264 4 |c ©2003 
300 |a xvii, 311páginas:   |b dia  |c 23 cm 
336 |2 rdacontent  |a texto  |b txt 
337 |2 rdamedia  |a no mediado  |b n 
338 |2 rdacarrier  |a volumen  |b nc 
504 |a incl. bibind. 
505 1 |a Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more -- Monitoring your network with tcpdump, dsniff, netstat, and other tools -- Protecting network connections with Secure Shell (SSH) and stunnel -- Safeguarding email sessions with Secure Sockets Layer (SSL) -- Encrypting files and email messages with GnuPG -- Probing your own security with password crackers, nmap, and handy scripts 
520 3 |a The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. 
650 1 0 |a Programación informática  |9 7362 
650 1 7 |2 UCuenca-cdrjbv  |9 7361  |a Informática 
700 1 |9 100200  |a Silverman, Richard E.  |e autor 
700 1 |9 100201  |a Byrnes, Robert G.  |e autor 
852 |a UC-CDJBV  |f Compra  |l 1  |m General  |p 20101213  |q 39.95  |r 2  |t 108440  |y 305303  |b 0  |d CDRC  |e CDRC  |g 005.4 PRIMER PISO  |z 2010-01-21 
942 |c BK  |2 ddc  |z ivan.verdugo@ucuenca.edu.ec