Hacking exposed Linux : (Record no. 4853)

000 -LEADER
fixed length control field 10114cam a2200361 a 4500
001 - CONTROL NUMBER
control field u4310
003 - CONTROL NUMBER IDENTIFIER
control field SA-PMU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210418123828.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080709s2008 nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008030495
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Modifying agency YDXCP
-- BAKER
-- C#P
-- CDX
-- BWX
-- VP@
-- UKM
-- BTCTA
-- QBX
-- CDN
-- OCLCQ
-- EDK
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780072262575 (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0072262575 (alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)234073834
Canceled/invalid control number (OCoLC)144565988
-- (OCoLC)183915312
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.O63
Item number H375 2008
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 00 - TITLE STATEMENT
Title Hacking exposed Linux :
Remainder of title Linux security secrets & solutions /
Statement of responsibility, etc. ISECOM.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York, NY :
Name of publisher, distributor, etc. McGraw-Hill,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 613 p. :
Other physical details ill. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Previous ed. under title: Hacking Linux exposed / Brian Hatch, 2003.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Foreword -- Acknowledgments -- Introduction -- Part 1: Security And Controls -- 1: Applying security -- Case study -- Free from risk -- Four comprehensive constraints -- Elements of security -- Summary -- 2: Applying interactive controls -- Case study -- Five interactive controls -- Summary -- 3: Applying process controls -- Case study -- Five process controls -- Summary -- Part 2: Hacking The System -- 4: Local access control -- Case study -- Physical access to Linux systems --Console access -- Privilege escalation -- Sudo -- File permissions and attributes -- Chrooting -- Physical access, encryption, and password recovery -- Volatile data -- Summary -- 5: Data networks security -- Case study -- Network visibility -- Network and systems profiling -- Network architecture -- Covert communications and clandestine administration -- Summary -- 6: Unconventional data attack vectors -- Case study -- Overview of PSTN, ISDN, and PSDN attack vectors -- Introducing PSTN -- Introducing ISDN -- Introducing PSDN and X-25 -- Communication network attacks -- Tests to perform -- PSTN -- ISDN -- PSDN -- Tools to use -- PAW and PAWS -- Intelligent wardialer -- Shokdial -- Ward -- THCscan next generation -- PSDN testing tools -- Admx25 -- Sun solaris multihread and multichannel X-25 scanner -- Vudu -- Tscan -- Common banners -- How X-25 networks work -- Basic elements -- Call setup -- Error codes -- X-3/X-28 PAD answer codes -- X-25 addressing format -- DCC annex list -- Key points for getting X-25 access -- X-28 dialup with NUI -- X-28 dialup via reverse charge -- Private X-28 PAD via a standard or toll-free PSTN or ISDN -- Number -- Internet to x-25 gateways -- Cisco systems -- VAX/VMS or AXP/opens VMS -- NIX systems -- Summary -- 7: Voice over IP -- Case study -- VoIP attack taxonomy -- Network attacks -- System attacks -- Signaling attacks -- Introduction to VoIP testing tools -- Transport attacks -- VoIP security challenges -- Firewalls and NAT -- Encryption -- Summary -- 8: Wireless networks -- Case study -- State of the wireless -- Wireless hacking physics: radio frequency -- RF spectrum analysis -- Exploiting 802-11 the hacker way -- Wireless auditing activities and procedures -- Auditing wireless policies -- Summary -- 9: Input/output devices -- Case study -- About bluetooth -- Bluetooth profiles -- Entities on the bluetooth protocol stack -- Summary -- 10: RFID-radio frequency identification -- Case study -- History of RFID: Leon theremin and "the thing" -- Identification-friend-or-foe -- RFID components -- Purpose of RFID -- Passive tags -- Active tags -- RFID uses -- RFID-enabled passports -- Ticketing -- Other current RFID uses -- RFID frequency standards -- RFID technology standards -- RFID attacks -- RFID hacker's toolkit -- Implementing RFID systems using Linux -- RFID readers connected to a Linux system -- RFID readers with embedded Linux -- Linux systems as backend/middleware/database -- Servers in RFID systems -- Linux and RFID-related projects and products -- OpenMRTD -- OpenPCD -- Open PICC -- Magellan technology -- PFIDiot -- RFID guardian -- OpenBeacon -- Ominkey -- Linux RFID kit -- Summary -- 11: Emanation attacks -- Case study -- Van Eck Phreaking -- Other "side-channel" attacks -- Summary -- 12: Trusted computing -- Case study -- Introduction to trusted computing -- Platform attack taxonomy -- Hardware attacks -- Low-level software attacks -- System software attacks -- Application attacks -- General support for trusted computing applications -- TPM device driver -- TrouSerS -- TPM emulator -- jTSS wrapper -- TPM manager -- Examples of trusted computing applications -- Enforcer -- TrustedGRUB (tGrub) -- TPM keyring -- Turaya, VPN and Turaya-Crypt -- Open trusted computing -- TCG industrial applications -- Summary -- Part 3: Hacking The Users -- 13: Web application hacking -- Case study -- Enumeration -- Access and controls exploitation -- Insufficient data validation -- Web 2-0 attacks -- Trust manipulation -- Trust and awareness hijacking -- Man-in-the-middle -- Web infrastructure attacks -- Summary -- 14: Mail services -- Case SMTP basics -- Understanding sender and envelope sender -- Email routing -- SMTP attach taxonomy -- Fraud -- Alteration of data or integrity -- Denial of service or availability -- Summary -- 15: Name services -- Case study -- DNS basics -- DNS and IPv6 -- Social aspect: DNS and Phishing -- WHOIS and domain registration and domain hijacking -- Technical aspect: spoofing, cache poisoning, and other attacks -- Bind hardening -- Summary -- Part 4: Care And Maintenance -- 16: Reliability: static analysis of C code -- Case study -- Formal vs semiformal methods -- Semiformal methods -- Formal methods -- Static analysis -- C code static analysis -- Analyzing C code using hoare logics -- Weakest precondition calculus -- Verification conditions -- Termination -- Methodology -- Some C analysis tools -- Tools based on abstract interpretation -- Tools based on hoare logics -- Tools based on model checking -- Additional references -- Summary -- 17: Security tweaks in the Linux kernel -- Linux security modules -- CryptoAPI -- NetFilter enhancements -- Enhanced wireless stack -- File system enhancement -- POSIX access control lists -- NFSv4 -- Additional kernel resources -- Man pages online -- Online documentation -- Other references -- Part 5: Appendixes -- A: Management and maintenance -- Best practices node setup -- Use cryptographically secured services -- Prevention against brute-force -- Deny all, allow specifically -- One-time passwords -- Automated scanning techniques -- Lock out on too high fail count -- Avoid loadable kernel module feature -- Enforce password policy -- Use sudo for system administration tasks -- Check IPv6 status -- Justify enabled daemons -- Set mount and filesystem options -- Harden a system through/proc -- Passwords -- Hardware health -- Checking log files -- Best practices network environment setup -- Ingress and egress filtering -- Build network segments and host-based firewalls -- Perform time synchronization -- Watch security mailing lists -- Collect log files at a central place -- Collect statistics within the network -- Use VPN for remote management -- Additional helpful tools -- Intrusion detection systems -- System monitoring -- Replace legacy applications -- Xinetd -- Syslog-ng -- Daemontools -- Other service management tools -- Automating system administration -- Perl scripting language -- Cfengine -- B: Linux forensics and data recovery -- Hardware: the forensic workstation -- Hardware: other valuable tools -- Software: operating system -- Software tools -- So, where should you start from? -- Live investigation/acquisition -- Post mortem analysis -- Handling electronic evidence -- Legislative regulations -- Definition of electronic evidence -- Equivalence of traditional evidence to electronic evidence -- Advantages and disadvantages of electronic evidence -- Working with electronic evidence -- Requirements that electronic evidence must fulfill to be admitted in court -- C: BSD -- Overview of BSD projects -- Security features found in all BSDs -- Securelevel -- Security scripts -- Sysctl(8) -- Rc-conf -- Rc-subr(8) -- Chflags(1) -- Ttys(5) -- Sshd-config(5) -- Blowfish support -- System accounting -- Ipsec(4) -- Randomness -- Chroot(8) -- FreeBSD -- ACLs -- MAC policies -- OpenBSM -- OpenPAM -- Jail(8) -- VuXML -- Portaudit(1) -- Gbde(4) -- Geli(8) -- NetBSD -- Kauth(9) -- Veriexec(4) -- Pw-policy(3) -- Fileassoc(9) -- Audit-packages -- Vgd(4) -- Clockctl(4) -- OpenBSD -- ProPolice -- WAX -- Systrace(1) -- Encripted swap -- Pf(4) firewall features -- BSD security advisories -- Additional BSD resources -- Online man pages -- Online documentation -- Books -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. Synopsis: The Latest Linux Security Solutions. This authoritative guide will help you secure your Linux network-whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. Secure Linux by using attacks and countermeasures from the latest OSSTMM research; Follow attack techniques of PSTN, ISDN, and PSDN over Linux; Harden VoIP, Bluetooth, RF, RFID, and IR devices on Linux; Block Linux signal jamming, cloning, and eavesdropping attacks; Apply Trusted Computing and cryptography tools for your best defense; Fix vulnerabilities in DNS, SMTP, and Web 2.0 services; Prevent SPAM, Trojan, phishing, DoS, and DDoS exploits; Find and repair errors in C code with static analysis and Hoare Logic.
596 ## -
-- 1 2
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Linux.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Hatch, Brian.
Title of a work Hacking Linux exposed.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ISECOM (Organization)
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents only
Uniform Resource Identifier <a href="http://catdir.loc.gov/catdir/toc/ecip0823/2008030495.html">http://catdir.loc.gov/catdir/toc/ecip0823/2008030495.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
994 ## -
-- Z0
-- SUPMU
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type Public note
          Main Library Main Library 04/18/2021   QA76.76 .O63 H375 2008 51952000069188 04/15/2021 1 04/15/2021 Books STACKS
          Female Library Main Library 04/18/2021   QA76.76 .O63 H375 2008 51952000089193 12/26/2021 1 04/15/2021 Books STACKS