EUR 12,88 für den Versand von China nach Deutschland
Versandziele, Kosten & DauerAnbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 17769 Publisher: Electronic Industry Press Pub. Date :2009-06. Linux Server Security Policy Detailed Explanation (2nd edition) A total of 28 chapters and an appendix. Generally speaking. the essence of five parts: The first part introduces classification of attacks on the Linux server. as well as Linux network infrastructure; second part is Linux Server Security Policy Detailed Explanation (2nd edition). the core. for different Linux servers were to present their security policy; third section describes the Linux server security tools; The fourth part is the open source Linux. database security. and building the news server under Linux. phishing prevention. Linux to build its wireless network security strategy. using the Linux Security Audit and Selinux to protect Linux servers using the method; fifth part is an appendix. the Linux server processes and emergency response procedures. Linux is the server. or in other words. the server achievements of Linux. I believe the reader to judge for such views will certainly be different. This is not inaccurate. just to emphasize Linux inherent natural connection with the server. In fact. for the Linux vendors. approximately 90% of the revenue from the server application market. Linux is primarily used to set up a network server. Today on the server and the site was hacked reports can be seen almost every day. and with the variety of network applications. forms and methods of attack are also changing. How to enhance the security of Linux servers is more Contents: Chapter 1 linux linux server network infrastructure and security threats to network infrastructure 1.1.1 linux 1.1 linux network structure characteristics 1.1.2 tcpip model and osi seven layer model four 1.1. 3 tcpip application to provide the main user port number assigned 1.2 linux 1.1.4 of The tcpip tcpip network configuration 1.2.1 linux network configuration file 1.2.2 1.2.3 Network Configuration tool to configure network interfaces 1.3 grade resolve the attack on the linux server 1.3.1 What the attacker to use the operating system 1.3.2 What are the typical characteristics of the attacker attacker 1.3.3 What is the typical goal 1.3.4 What is the reason to attack attack level 1.3.6 1.3.5 1.4 open counter-measures source software Network Security Overview 1.5 Summary Chapter 2 linux network security with openssl 2.Four Satisfaction guaranteed,or money back. Bestandsnummer des Verkäufers J84771
Anzahl: 10 verfügbar