Result

Custom Search

Friday, November 14, 2008

Hacker Linux Uncovered

Image

This book is devoted to exploring one of the most popular operating systems installed on servers: Linux. So far, this operating system has not been as popular among home users as among professional administrators. There have been, however, developments of late that make this system likely to capture a good segment of the home-computer operating system market. The operating system is becoming easier to install all the time, and its graphical user interface and the ease of use often give the most popular operating system among home users — Windows — a good run for its money.

Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided.

This book is different from other books on the subject in that the security and performance are considered not in separate chapters at the end of the book — doing this would be a big mistake — but throughout the book as may be necessary. If a person acquires unproductive habits of working with the system, two chapters at the end of the book as an afterthought will not break these wrong habits to teach the right ones. This is why the performance and security of each area considered will be discussed immediately without putting it off until the end of the book.


TABLE OF CONTENT:
Chapter 01 - Introduction
Chapter 02 - Linux Installation and Initial Configuration
Chapter 03 - Welcome to Linux!
Chapter 04 - Access Control
Chapter 05 - Administration
Chapter 06 - Samba Style
Chapter 07 - Web Server
Chapter 08 - Electronic Mail
Chapter 09 - Gateway to Internet
Chapter 10 - File Transfer
Chapter 11 - Network Addressing
Chapter 12 - System Monitoring
Chapter 13 - Backing Up and Restoring Data
Chapter 14 - Advice from a Hacker
DownloadLink
http://rapidshare.com/files/99132708/Hacker_Linux_Uncovered.rar

No comments: