Hacking Exposed Linux https://www.mheducation.com/cover-images/Jpeg_400-high/0072262575.jpeg
Hacking Exposed Linux

Hacking Exposed Linux

3rd Edition
ISBN10: 0072262575
ISBN13: 9780072262575
Copyright: 2008

Purchase Options

Students, we’re committed to providing you with high-value course solutions backed by great service and a team that cares about your success. See tabs below to explore options and pricing. Don't forget, we accept financial aid and scholarship funds in the form of credit or debit cards.


Out of stock

ISBN10: 0072262575 | ISBN13: 9780072262575



The estimated amount of time this product will be on the market is based on a number of factors, including faculty input to instructional design and the prior revision cycle and updates to academic research-which typically results in a revision cycle ranging from every two to four years for this product. Pricing subject to change at any time.

Program Details

Part I: Security and Controls
Chapter 1. Applying Security
Chapter 2. Applying Interactive Controls
Chapter 3. Applying Process Controls
Part II: Hacking the System
Chapter 4. Local Access Control
Chapter 5. Data Networks Security
Chapter 6. Unconventional Data Attack Vectors
Chapter 7. Voice over IP
Chapter 8. Wireless Networks
Chapter 9. Input/Output Devices
Chapter 10. RFID--Radio Frequency Identification
Chapter 11. Emanation Attacks
Chapter 12. Trusted Computing
Part III: Hacking the Users
Chapter 13. Web Application Hacking
Chapter 14. Mail Services
Chapter 15. Name Services
Part IV: Care and Maintenance
Chapter 16. Reliability: Static Analysis of C Code
Chapter 17. Security Tweaks in the Linux Kernal
Part V: Appendixes
Appendix A. Management and Maintenance
Appendix B. Linux Forensics and Data Recovery
Appendix C. BSD