Hardening Linux

Hardening Linux
Author: James Turnbull
Publisher: Apress
Total Pages: 571
Release: 2006-11-01
Genre: Computers
ISBN: 1430200057

*Imparts good security doctrine, methodology, and strategies *Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application. *Offers users a selection of resources (websites, mailing lists, and books) to further their knowledge.

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers
Author: Johnny Long
Publisher: Elsevier
Total Pages: 529
Release: 2004-12-17
Genre: Computers
ISBN: 0080478050

Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Real World Linux Security

Real World Linux Security
Author: Bob Toxen
Publisher: Prentice Hall Professional
Total Pages: 852
Release: 2003
Genre: Computers
ISBN: 9780130464569

With all-new coverage of home, mobile, and wireless issues, migrating from IP chains to IP tables, and protecting your network from users as well as hackers, this book provides immediate and effective Intrusion Detection System techniques. Contains practical solutions for every system administrator working with any Linux system, large or small.

Hardening Apache

Hardening Apache
Author: Tony Mobily
Publisher: Apress
Total Pages: 284
Release: 2004-04-26
Genre: Computers
ISBN: 1430206756

* Thorough coverage of Apache security * Accessible for both junior and senior level system administrators * This will be most up-to-date book on Apache Foreword and tech review by Ken Coar; one of the most respected people in the industry

Linux iptables Pocket Reference

Linux iptables Pocket Reference
Author: Gregor N. Purdy
Publisher: "O'Reilly Media, Inc."
Total Pages: 98
Release: 2004-08-25
Genre: Computers
ISBN: 1449378986

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered onLinux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications,followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.

C++ GUI Programming with Qt3

C++ GUI Programming with Qt3
Author: Jasmin Blanchette
Publisher: Prentice Hall Professional
Total Pages: 468
Release: 2004
Genre: Computers
ISBN: 9780131240728

Straight from Trolltech, this book covers all one needs to build industrial-strength applications with Qt 3.2.x and C++--applications that run natively on Windows, Linux/UNIX, Mac OS X, and embedded Linux with no source code changes. Includes a CD with the Qt 3.2 toolset and Borland C++ compilers--including a noncommercial Qt 3.2 for Windows available nowhere else.

Rapid Application Development with Mozilla

Rapid Application Development with Mozilla
Author: Nigel McFarlane
Publisher: Prentice Hall Professional
Total Pages: 806
Release: 2004
Genre: Computers
ISBN: 9780131423435

Rapid Application Development with Mozilla, part of the Bruce Perens Open Source Series, is a concise guide for any programmer who wants to learn the versatility and compatibility of Mozilla, an open source toolset with over a thousand objects and components. An additional feature of Rapid Application Development with Mozilla is the NoteTaker Web browser add-on-a sample Mozilla application that is developed throughout the book. Written by Web and XML expert Nigel McFarlane, this book is the perfect addition to the library of any user-interface software engineer, cross-platform developer, or any programmer looking to discover the benefits of rapid application development.

The Official Samba-3 HOWTO and Reference Guide

The Official Samba-3 HOWTO and Reference Guide
Author: John H. Terpstra
Publisher: Prentice Hall Professional
Total Pages: 732
Release: 2004
Genre: Computers
ISBN: 9780131453555

A guide to the features of Samba-3 provides step-by-step installation instructions on integrating Samba into a Windows or UNIX environment.

Implementing CIFS

Implementing CIFS
Author: Christopher R. Hertel
Publisher: Prentice Hall Professional
Total Pages: 678
Release: 2004
Genre: Computers
ISBN: 9780130471161

"The book that Microsoft should have written, but didn't." --Jeremy Allison, Samba Team "Your detailed explanations are clear and backed-up with source code--and the numerous bits of humor make a dry subject very enjoyable to read." --J.D. Lindemann, network engineer, Adaptec, Inc. The first developer's guide to Microsoft(R)'s Internet/Intranet file sharing standard For years, developers and administrators have struggled to understand CIFS, Microsoft's poorly documented standard for Internet file sharing. Finally, there is an authoritative, cross-platform guide to CIFS capabilities and behavior. Implementing CIFS not only delivers the priceless knowledge of a Samba Team member dedicated to investigating the inner workings of CIFS, it also identifies and describes crucial specifications and supporting documents. Provides essential information for designing and debugging large Windows(R) and/or Samba networks Offers clear, in-depth introductions to Server Message Block (SMB), NetBIOS over TCP/IP (NBT), browser services, and authentication Drills down into the internals of CIFS, exposing its behavior on the wire and at the desktop--and its strange quirks Presents illustrative code examples throughout Reflects years of work reviewing obscure documentation, packet traces, and sourcecode Includes the SNIA CIFS Technical Reference Implementing CIFS will be indispensable to every developer who wants to provide CIFS compatibility--and every administrator or security specialist who needs an in-depth understanding of how it really works.