000 06366cam a2200937 i 4500
001 ocn948774688
003 OCoLC
005 20240523125539.0
006 m o d
007 cr |n|||||||||
008 160505s2016 inu o 000 0 eng d
010 _a 2016937233
040 _aYDXCP
_beng
_erda
_epn
_cYDXCP
_dDG1
_dEBLCP
_dOCLCF
_dINTCL
_dCOO
_dUMI
_dYDX
_dDG1
_dRECBK
_dIDB
_dIDEBK
_dTEFOD
_dTEF
_dDEBSZ
_dN$T
_dOCLCQ
_dOCLCO
_dDG1
_dLIP
_dMERUC
_dOCLCQ
_dOCLCO
_dUAB
_dCCO
_dU3W
_dK6U
_dLOA
_dOCLCA
_dCOCUF
_dZCU
_dICG
_dCNNOR
_dOCLCQ
_dD6H
_dOCLCQ
_dOCLCO
_dOCLCA
_dUUM
_dWRM
_dSTF
_dKSU
_dRRP
_dINT
_dVT2
_dWYU
_dOCLCQ
_dOCLCO
_dG3B
_dLVT
_dS8J
_dS9I
_dTKN
_dOCLCQ
_dOCLCO
_dOCLCQ
_dDKC
_dAU@
_dOCLCQ
_dUKAHL
_dOCLCQ
_dOCLCO
_dOCLCQ
_dELBRO
_dOCLCO
_dOCLCQ
_dUKMGB
_dOCLCO
_dOCLCL
_dOCLCQ
015 _aGBB678935
_2bnb
016 7 _a017846935
_2Uk
019 _a949754761
_a958923861
_a959032350
_a960275872
_a961309526
_a964922763
_a967072295
_a989416399
_a1060185091
_a1066621668
_a1107372955
_a1228616069
020 _a9781119283096
_q(electronic bk.)
020 _a1119283094
_q(electronic bk.)
020 _a9781119277644
_q(e-book)
020 _a1119277647
_q(e-book)
020 _a1119277671
020 _a9781119277675
020 _z1119277655
020 _z9781119277651
029 1 _aAU@
_b000057932160
029 1 _aAU@
_b000058034653
029 1 _aCHBIS
_b010879401
029 1 _aCHNEW
_b000884479
029 1 _aCHNEW
_b000945364
029 1 _aCHVBK
_b480255229
029 1 _aDEBSZ
_b480360650
029 1 _aDEBSZ
_b485066963
029 1 _aGBVCP
_b866470441
029 1 _aUKMGB
_b017846935
035 _a(OCoLC)948774688
_z(OCoLC)949754761
_z(OCoLC)958923861
_z(OCoLC)959032350
_z(OCoLC)960275872
_z(OCoLC)961309526
_z(OCoLC)964922763
_z(OCoLC)967072295
_z(OCoLC)989416399
_z(OCoLC)1060185091
_z(OCoLC)1066621668
_z(OCoLC)1107372955
_z(OCoLC)1228616069
037 _a921124
_bMIL
037 _a320C3F76-4D1D-4AA8-9509-096BDB4129B3
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aQA76.9.A25
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aCOM
_x060000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aBinnie, Chris,
_eauthor.
245 1 0 _aLinux Server security :
_bhack and defend /
_cChris Binnie.
264 1 _aIndianapolis, IN :
_bWiley,
_c2016.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aOnline resource; title from PDF title page (John Wiley, viewed May 11, 2016).
520 _aLinux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. -- from the publisher.
505 0 _aIntroduction -- How This Book Is Organized -- Who Should Read This Book -- Summary -- Chapter 1: Invisibility Cloak -- Background -- Installing knockd -- Some Config Options -- Testing Your Install -- Making Your Server Invisible -- Further Considerations -- Summary -- Chapter 2: Digitally Fingerprint Your Files -- Filesystem Integrity -- Whole Filesystem -- Rootkits -- Configuration -- False Positives -- Well Designed -- Summary -- Chapter 3: Twenty-First-Century Netcat -- History -- Installation Packages -- Transferring Files -- Chaining Commands Together -- Secure Communications -- Executables -- Access Control Lists -- Miscellaneous Options -- Summary -- Chapter 4: Denying Service -- NTP Infrastructure -- NTP Reflection Attacks -- Attack Reporting -- Preventing SNMP Reflection -- DNS Resolvers -- Complicity -- Bringing a Nation to Its Knees -- Mapping Attacks -- Summary -- Chapter 5: Nping -- Functionality -- TCP -- Interpreter -- UDP -- ICMP -- ARP -- Payload Options -- Echo Mode -- Other Nping Options -- Summary -- Chapter 6: Logging Reconnoiters -- ICMP Misconceptions -- tcpdump -- Iptables -- Multipart Rules -- Log Everything for Forensic Analysis -- Hardening -- Summary -- Chapter 7: Nmap's Prodigious NSE -- Basic Port Scanning -- The Nmap Scripting Engine -- Timing Templates -- Categorizing Scripts -- Contributing Factors -- Security Holes -- Authentication Checks -- Discovery -- Updating Scripts -- Script Type -- Regular Expressions -- Graphical User Interfaces -- Zenmap -- Summary -- Chapter 8: Malware Detection -- Getting Started -- Configuration -- Summary -- Chapter 9: Password Cracking with Hashcat -- History -- Understanding Passwords -- Using Hashcat -- Running Hashcat -- oclHashcat -- Hashcat-Utils -- Summary -- Chapter 10: SQL Injection Attacks -- History -- Basic SQLi -- Mitigating SQLi in PHP -- Exploiting SQL Flaws.
505 8 _aLaunching an Attack -- Trying SQLi Legally -- Summary -- End User License Agreement.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
630 0 0 _aLinux.
630 0 7 _aLinux
_2fast
650 0 _aComputer security.
650 0 _aClient/server computing.
650 0 _aWeb servers.
650 2 _aComputer Security
650 6 _aS�ecurit�e informatique.
650 6 _aArchitecture client-serveur (Informatique)
650 6 _aServeurs Web.
650 7 _aCOMPUTERS
_xSecurity
_xNetworking.
_2bisacsh
650 7 _aClient/server computing
_2fast
650 7 _aComputer security
_2fast
650 7 _aWeb servers
_2fast
758 _ihas work:
_aLinux Server security (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGbDF9gDdR3b9kHFYMgPHC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aBinnie, Chris.
_tLinux Server security.
_dIndianapolis, IN : Wiley, 2016
_z1119277655
_z9781119277651
_w(OCoLC)936344734
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119283096
938 _aeLibro
_bELBO
_nELB177325
938 _aAskews and Holts Library Services
_bASKH
_nAH30446618
938 _aAskews and Holts Library Services
_bASKH
_nAH29996753
938 _aEBL - Ebook Library
_bEBLB
_nEBL4519259
938 _aEBSCOhost
_bEBSC
_n1233764
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis33662032
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00681448
938 _aYBP Library Services
_bYANK
_n12979691
938 _aYBP Library Services
_bYANK
_n12976388
994 _a92
_bINLUM
999 _c12353
_d12353