Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log the system to detect potential security problems. Backup and recovery policies that provide a structure for secure operations are also considered, and information related to configuring an Apache server, e-mail service, and the Internet gateway using a proxy server, an FTP server, DSN server for mapping DNS names to IP addresses, and firewall for system protection is provided.
http://rapidshare.com/files/9673251/1931769508.rar
or
http://www.megaupload.com/?d=0N8BAUK8
or
http://depositfiles.com/files/490545
or
http://www.uploading.com/files/SN3ILTET/A.List.Hacker.Linux.Uncovered.ebook_Spy.chm.html
http://rapidshare.com/files/9816485/Hacker.Linux.Uncovered-1931769508.rar
No comments:
Post a Comment