Linux security cookbook:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Beijing u.a.
O'Reilly
2003
|
Ausgabe: | 1. ed. |
Schriftenreihe: | Security tools & techniques
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XVII, 311 S. Ill., graph. Darst. |
ISBN: | 0596003919 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV017110767 | ||
003 | DE-604 | ||
005 | 20150115 | ||
007 | t | ||
008 | 030429s2003 gw ad|| |||| 00||| eng d | ||
016 | 7 | |a 967377889 |2 DE-101 | |
020 | |a 0596003919 |9 0-596-00391-9 | ||
035 | |a (OCoLC)51964625 | ||
035 | |a (DE-599)BVBBV017110767 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-703 |a DE-29T |a DE-706 |a DE-634 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Barrett, Daniel J. |e Verfasser |0 (DE-588)114568847 |4 aut | |
245 | 1 | 0 | |a Linux security cookbook |c Daniel J. Barrett ; Richard E. Silverman, and Robert G. Byrnes |
250 | |a 1. ed. | ||
264 | 1 | |a Beijing u.a. |b O'Reilly |c 2003 | |
300 | |a XVII, 311 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Security tools & techniques | |
630 | 0 | 4 | |a Linux |
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 7 | |a Linux |2 gtt | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Operating systems (Computers) | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a LINUX |0 (DE-588)4337730-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a LINUX |0 (DE-588)4337730-0 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Silverman, Richard E. |e Verfasser |4 aut | |
700 | 1 | |a Byrnes, Robert G. |e Verfasser |4 aut | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010317315&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-010317315 |
Datensatz im Suchindex
_version_ | 1808225921378811904 |
---|---|
adam_text |
TABLE
OF
CONTENTS
PREFACE
.
XI
1.
SYSTEM
SNAPSHOTS
WITH
TRIPWIRE
.
1
1.1
SETTING
UP
TRIPWIRE
4
1.2
DISPLAYING
THE
POLICY
AND
CONFIGURATION
5
1.3
MODIFYING
THE
POLICY
AND
CONFIGURATION
6
1.4
BASIC
INTEGRITY
CHECKING
7
1.5
READ-ONLY
INTEGRITY
CHECKING
8
1.6
REMOTE
INTEGRITY
CHECKING
9
1.7
ULTRA-PARANOID
INTEGRITY
CHECKING
11
1.8
EXPENSIVE,
ULTRA-PARANOID
SECURITY
CHECKING
13
1.9
AUTOMATED
INTEGRITY
CHECKING
13
1.10
PRINTING
THE
LATEST
TRIPWIRE
REPORT
14
1.11
UPDATING
THE
DATABASE
15
1.12
ADDING
FILES
TO
THE
DATABASE
16
1.13
EXCLUDING
FILES
FROM
THE
DATABASE
17
1.14
CHECKING
WINDOWS
VFAT
FILESYSTEMS
17
1.15
VERIFYING
RPM-INSTALLED
FILES
18
1.16
INTEGRITY
CHECKING
WITH
RSYNC
19
1.17
INTEGRITY
CHECKING
MANUALLY
20
2.
FIREWALLS
WITHIPTABLES
AND
IPCHAINS
.
23
2.1
ENABLING
SOURCE
ADDRESS
VERIFICATION
24
2.2
BLOCKING
SPOOFED
ADDRESSES
26
2.3
BLOCKING
ALL
NETWORK
TRAFFIC
28
2.4
BLOCKING
INCOMING
TRAFFIC
28
2.5
BLOCKING
OUTGOING
TRAFFIC
30
VL
|
TABLE
OF
CONTENTS
2.6
BLOCKING
INCOMING
SERVICE
REQUESTS
30
2.7
BLOCKING
ACCESS
FROM
A
REMOTE
HOST
31
2.8
BLOCKING
ACCESS
TO
A
REMOTE
HOST
32
2.9
BLOCKING
OUTGOING
ACCESS
TO
ALL
WEB
SERVERS
ON
A
NETWORK
33
2.10
BLOCKING
REMOTE
ACCESS,
BUT
PERMITTING
LOCAL
34
2.11
CONTROLLING
ACCESS
BY
MAC
ADDRESS
35
2.12
PERMITTING
SSH
ACCESS
ONLY
36
2.13
PROHIBITING
OUTGOING
TELNET
CONNECTIONS
37
2.14
PROTECTING
A
DEDICATED
SERVER
38
2.15
PREVENTING
PINGS
39
2.16
LISTING
YOUR
FIREWALL
RULES
39
2.17
DELETING
FIREWALL
RULES
41
2.18
INSERTING
FIREWALL
RULES
42
2.19
SAVING
A
FIREWALL
CONFIGURATION
42
2.20
LOADING
A
FIREWALL
CONFIGURATION
43
2.21
TESTING
A
FIREWALL
CONFIGURATION
45
2.22
BUILDING
COMPLEX
RULE
TREES
46
2.23
LOGGING
SIMPLIFIED
47
NETWORK
ACCESS
CONTROL
.
.
49
3.1
LISTING
YOUR
NETWORK
INTERFACES
51
3.2
STARTING
AND
STOPPING
THE NETWORK
INTERFACE
52
3.3
ENABLING/DISABLING
A
SERVICE
(XINETD)
53
3.4
ENABLING/DISABLING
A
SERVICE
(INETD)
54
3.5
ADDING
A
NEW
SERVICE
(XINETD)
55
3.6
ADDING
A
NEW
SERVICE
(INETD)
56
3.7
RESTRICTING
ACCESS
BY
REMOTE
USERS
57
3.8
RESTRICTING
ACCESS
BY
REMOTE
HOSTS
(XINETD)
58
3.9
RESTRICTING
ACCESS
BY
REMOTE
HOSTS
(XINETD
WITH
LIBWRAP)
59
3.10
RESTRICTING
ACCESS
BY
REMOTE
HOSTS
(XINETD
WITH
TCPD)
60
3.11
RESTRICTING
ACCESS
BY
REMOTE
HOSTS
(INETD)
61
3.12
RESTRICTING
ACCESS
BY
TIME
OF
DAY
62
3.13
RESTRICTING
ACCESS
TO
AN
SSH
SERVER
BY
HOST
64
3.14
RESTRICTING
ACCESS
TO
AN
SSH
SERVER
BY
ACCOUNT
64
3.15
RESTRICTING
SERVICES
TO
SPECIFIC
FILESYSTEM
DIRECTORIES
65
3.16
PREVENTING
DENIAL
OF
SERVICE
ATTACKS
67
3.17
REDIRECTING
TO
ANOTHER
SOCKET
69
3.18
LOGGING
ACCESS
TO
YOUR
SERVICES
70
3.19
PROHIBITING
ROOT
LOGINS
ON
TERMINAL
DEVICES
71
4.
AUTHENTICATION
TECHNIQUES
AND
INFRASTRUCTURES
.72
4.1
CREATING
A
PAM-AWARE
APPLICATION
74
4.2
ENFORCING
PASSWORD
STRENGTH
WITH
PAM
75
4.3
CREATING
ACCESS
CONTROL
LISTS
WITH
PAM
76
4.4
VALIDATING
AN
SSL
CERTIFICATE
78
4.5
DECODING
AN
SSL
CERTIFICATE
79
4.6
INSTALLING
A
NEW
SSL
CERTIFICATE
80
4.7
GENERATING
AN
SSL
CERTIFICATE
SIGNING
REQUEST
(CSR)
81
4.8
CREATING
A
SELF-SIGNED
SSL
CERTIFICATE
83
4.9
SETTING
UP
A
CERTIFYING
AUTHORITY
84
4.10
CONVERTING
SSL
CERTIFICATES
FROM
DER
TO
PEM
87
4.11
GETTING
STARTED
WITH
KERBEROS
88
4.12
ADDING
USERS
TO
A
KERBEROS
REALM
92
4.13
ADDING
HOSTS
TO
A
KERBEROS
REALM
93
4.14
USING
KERBEROS
WITH
SSH
94
4.15
USING
KERBEROS
WITH
TELNET
96
4.16
SECURING
IMAP
WITH
KERBEROS
98
4.17
USING
KERBEROS
WITH
PAM
FOR
SYSTEM-WIDE
AUTHENTICATION
100
AUTHORIZATION
CONTROLS
.
.
102
5.1
RUNNING
A
ROOT
LOGIN
SHELL
104
5.2
RUNNING
X
PROGRAMS
AS
ROOT
105
5.3
RUNNING
COMMANDS
AS
ANOTHER
USER
VIA
SUDO
106
5.4
BYPASSING
PASSWORD
AUTHENTICATION
IN
SUDO
106
5.5
FORCING
PASSWORD
AUTHENTICATION
IN
SUDO
108
5.6
AUTHORIZING
PER
HOST
IN
SUDO
108
5.7
GRANTING
PRIVILEGES
TO
A
GROUP
VIA
SUDO
110
5.8
RUNNING
ANY
PROGRAM
IN
A
DIRECTORY
VIA
SUDO
110
5.9
PROHIBITING
COMMAND
ARGUMENTS
WITH
SUDO
111
5.10
SHARING
FILES
USING
GROUPS
111
5.11
PERMITTING
READ-ONLY
ACCESS
TO
A
SHARED
FILE
VIA
SUDO
112
5.12
AUTHORIZING
PASSWORD
CHANGES
VIA
SUDO
113
5.13
STARTING/STOPPING
DAEMONS
VIA
SUDO
114
5.14
RESTRICTING
ROOT
'
S
ABILITIES
VIA
SUDO
115
5.15
KILLING
PROCESSES
VIA
SUDO
115
5.16
LISTING
SUDO
INVOCATIONS
117
5.17
LOGGING
SUDO
REMOTELY
118
5.18
SHARING
ROOT
PRIVILEGES
VIA
SSH
118
TABLE
OF
CONTENTS
|
VII
5.19
RUNNING
ROOT
COMMANDS
VIA
SSH
120
5.20
SHARING
ROOT
PRIVILEGES
VIA
KERBEROS
SU
121
PROTECTING
OUTGOING
NETWORK
CONNECTIONS
.
.
124
6.1
LOGGING
INTO
A
REMOTE
HOST
125
6.2
INVOKING
REMOTE
PROGRAMS
126
6.3
COPYING
FILES
REMOTELY
127
6.4
AUTHENTICATING
BY
PUBLIC
KEY
(OPENSSH)
129
6.5
AUTHENTICATING
BY
PUBLIC
KEY
(OPENSSH
CLIENT,
SSH2
SERVER,
OPENSSH
KEY)
131
6.6
AUTHENTICATING
BY
PUBLIC
KEY
(OPENSSH
CLIENT,
SSH2
SERVER,
SSH2
KEY)
133
6.7
AUTHENTICATING
BY
PUBLIC
KEY
(SSH2
CLIENT,
OPENSSH
SERVER)
134
6.8
AUTHENTICATING
BY
TRUSTED
HOST
135
6.9
AUTHENTICATING
WITHOUT
A
PASSWORD
(INTERACTIVELY)
138
6.10
AUTHENTICATING
IN
CRON
JOBS
140
6.11
TERMINATING
AN
SSH
AGENT
ON
LOGOUT
141
6.12
TAILORING
SSH
PER
HOST
142
6.13
CHANGING
SSH
CLIENT
DEFAULTS
143
6.14
TUNNELING
ANOTHER
TCP
SESSION
THROUGH
SSH
144
6.15
KEEPING
TRACK
OF
PASSWORDS
146
PROTECTING
FILES
.
.
147
7.1
USING
FILE
PERMISSIONS
148
7.2
SECURING
A
SHARED
DIRECTORY
149
7.3
PROHIBITING
DIRECTORY
LISTINGS
150
7.4
ENCRYPTING
FILES
WITH
A
PASSWORD
151
7.5
DECRYPTING
FILES
152
7.6
SETTING
UP
GNUPG
FOR
PUBLIC-KEY
ENCRYPTION
152
7.7
LISTING
YOUR
KEYRING
154
7.8
SETTING
A
DEFAULT
KEY
155
7.9
SHARING
PUBLIC
KEYS
156
7.10
ADDING
KEYS
TO
YOUR
KEYRING
157
7.11
ENCRYPTING
FILES
FOR
OTHERS
158
7.12
SIGNING
A
TEXT
FILE
159
7.13
SIGNING
AND
ENCRYPTING
FILES
159
7.14
CREATING
A
DETACHED
SIGNATURE
FILE
160
7.15
CHECKING
A
SIGNATURE
161
7.16
PRINTING
PUBLIC
KEYS
162
VIII
|
TABLE
OF
CONTENTS
TABLE
OF
CONTENTS
|
LX
7.17
BACKING
UP
A
PRIVATE
KEY
7.18
ENCRYPTING
DIRECTORIES
7.19
ADDING
YOUR
KEY
TO
A
KEYSERVER
7.20
UPLOADING
NEW
SIGNATURES
TO
A
KEYSERVER
7.21
OBTAINING
KEYS
FROM
A
KEYSERVER
162
164
165
165
166
168
169
170
171
173
7.22
REVOKING
A
KEY
7.23
MAINTAINING
ENCRYPTED
FILES
WITH
EMACS
7.24
MAINTAINING
ENCRYPTED
FILES
WITH
VIM
7.25
ENCRYPTING
BACKUPS
7.26
USING
PGP
KEYS
WITH
GNUPG
8.
PROTECTING
EMAIL
.
8.1
ENCRYPTED
MAIL
WITH
EMACS
8.2
ENCRYPTED
MAIL
WITH
VIM
8.3
ENCRYPTED
MAIL
WITH
PINE
8.4
ENCRYPTED
MAIL
WITH
MOZILLA
8.5
ENCRYPTED
MAIL
WITH
EVOLUTION
8.6
ENCRYPTED
MAIL
WITH
MUTT
8.7
ENCRYPTED
MAIL
WITH
ELM
8.8
ENCRYPTED
MAIL
WITH
MH
8.9
RUNNING
A
POP/IMAP
MAIL
SERVER
WITH
SSL
8.10
TESTING
AN
SSL
MAIL
CONNECTION
8.11
SECURING
POP/IMAP
WITH
SSL
AND
PINE
8.12
SECURING
POP/IMAP
WITH
SSL
AND
MUTT
8.13
SECURING
POP/IMAP
WITH
SSL
AND
EVOLUTION
8.14
SECURING
POP/IMAP
WITH
STUNNEL AND
SSL
8.15
SECURING
POP/IMAP
WITH
SSH
8.16
SECURING
POP/IMAP
WITH
SSH
AND
PINE
8.17
RECEIVING
MAIL
WITHOUT
A
VISIBLE
SERVER
8.18
USING
AN
SMTP
SERVER
FROM
ARBITRARY
CLIENTS
.
175
175
177
178
179
180
181
182
183
183
188
188
190
191
192
193
195
197
198
9.
TESTING
AND
MONITORING
.
9.1
TESTING
LOGIN
PASSWORDS
(JOHN
THE
RIPPER)
9.2
TESTING
LOGIN
PASSWORDS
(CRACKLIB)
9.3
FINDING
ACCOUNTS
WITH
NO
PASSWORD
9.4
FINDING
SUPERUSER
ACCOUNTS
9.5
CHECKING
FOR
SUSPICIOUS
ACCOUNT
USE
9.6
CHECKING
FOR
SUSPICIOUS
ACCOUNT
USE,
MULTIPLE
SYSTEMS
9.7
TESTING
YOUR
SEARCH
PATH
.
202
203
205
206
207
207
209
211
.
283
9.8
SEARCHING
FILESYSTEMS
EFFECTIVELY
212
9.9
FINDING
SETUID
(OR
SETGID)
PROGRAMS
215
9.10
SECURING
DEVICE
SPECIAL
FILES
217
9.11
FINDING
WRITABLE
FILES
218
9.12
LOOKING
FOR
ROOTKITS
219
9.13
TESTING
FOR
OPEN
PORTS
220
9.14
EXAMINING
LOCAL
NETWORK
ACTIVITIES
226
9.15
TRACING
PROCESSES
231
9.16
OBSERVING
NETWORK
TRAFFIC
233
9.17
OBSERVING
NETWORK
TRAFFIC
(GUI)
238
9.18
SEARCHING
FOR
STRINGS
IN
NETWORK
TRAFFIC
240
9.19
DETECTING
INSECURE
NETWORK
PROTOCOLS
243
9.20
GETTING
STARTED
WITH
SNORT
247
9.21
PACKET
SNIFFING
WITH
SNORT
248
9.22
DETECTING
INTRUSIONS
WITH
SNORT
250
9.23
DECODING
SNORT
ALERT
MESSAGES
252
9.24
LOGGING
WITH
SNORT
253
9.25
PARTITIONING
SNORT
LOGS
INTO
SEPARATE
FILES
255
9.26
UPGRADING
AND
TUNING
SNORT
'
S
RULESET
256
9.27
DIRECTING
SYSTEM
MESSAGES
TO
LOG
FILES
(SYSLOG)
257
9.28
TESTING
A
SYSLOG
CONFIGURATION
261
9.29
LOGGING
REMOTELY
262
9.30
ROTATING
LOG
FILES
263
9.31
SENDING
MESSAGES
TO
THE
SYSTEM
LOGGER
264
9.32
WRITING
LOG
ENTRIES
VIA
SHELL
SCRIPTS
265
9.33
WRITING
LOG
ENTRIES
VIA
PERL
267
9.34
WRITING
LOG
ENTRIES
VIA
C
268
9.35
COMBINING
LOG
FILES
269
9.36
SUMMARIZING
YOUR
LOGS
WITH
LOGWATCH
271
9.37
DEFINING
A
LOGWATCH
FILTER
272
9.38
MONITORING
ALL
EXECUTED
COMMANDS
273
9.39
DISPLAYING
ALL
EXECUTED
COMMANDS
275
9.40
PARSING
THE
PROCESS
ACCOUNTING
LOG
278
9.41
RECOVERING
FROM
A
HACK
279
9.42
FILING
AN
INCIDENT
REPORT
280
INDEX
X
|
TABLE
OF
CONTENTS |
any_adam_object | 1 |
author | Barrett, Daniel J. Silverman, Richard E. Byrnes, Robert G. |
author_GND | (DE-588)114568847 |
author_facet | Barrett, Daniel J. Silverman, Richard E. Byrnes, Robert G. |
author_role | aut aut aut |
author_sort | Barrett, Daniel J. |
author_variant | d j b dj djb r e s re res r g b rg rgb |
building | Verbundindex |
bvnumber | BV017110767 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 261 ST 277 |
ctrlnum | (OCoLC)51964625 (DE-599)BVBBV017110767 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV017110767</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150115</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030429s2003 gw ad|| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">967377889</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596003919</subfield><subfield code="9">0-596-00391-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51964625</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV017110767</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Barrett, Daniel J.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)114568847</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Linux security cookbook</subfield><subfield code="c">Daniel J. Barrett ; Richard E. Silverman, and Robert G. Byrnes</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Beijing u.a.</subfield><subfield code="b">O'Reilly</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVII, 311 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Security tools & techniques</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Linux</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">LINUX</subfield><subfield code="0">(DE-588)4337730-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">LINUX</subfield><subfield code="0">(DE-588)4337730-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Silverman, Richard E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Byrnes, Robert G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010317315&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010317315</subfield></datafield></record></collection> |
id | DE-604.BV017110767 |
illustrated | Illustrated |
indexdate | 2024-08-24T00:16:58Z |
institution | BVB |
isbn | 0596003919 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010317315 |
oclc_num | 51964625 |
open_access_boolean | |
owner | DE-703 DE-29T DE-706 DE-634 |
owner_facet | DE-703 DE-29T DE-706 DE-634 |
physical | XVII, 311 S. Ill., graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | O'Reilly |
record_format | marc |
series2 | Security tools & techniques |
spelling | Barrett, Daniel J. Verfasser (DE-588)114568847 aut Linux security cookbook Daniel J. Barrett ; Richard E. Silverman, and Robert G. Byrnes 1. ed. Beijing u.a. O'Reilly 2003 XVII, 311 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Security tools & techniques Linux Computerbeveiliging gtt Linux gtt Computer networks Security measures Operating systems (Computers) Datensicherung (DE-588)4011144-1 gnd rswk-swf LINUX (DE-588)4337730-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf LINUX (DE-588)4337730-0 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s DE-604 Silverman, Richard E. Verfasser aut Byrnes, Robert G. Verfasser aut DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010317315&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Barrett, Daniel J. Silverman, Richard E. Byrnes, Robert G. Linux security cookbook Linux Computerbeveiliging gtt Linux gtt Computer networks Security measures Operating systems (Computers) Datensicherung (DE-588)4011144-1 gnd LINUX (DE-588)4337730-0 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4337730-0 (DE-588)4274324-2 |
title | Linux security cookbook |
title_auth | Linux security cookbook |
title_exact_search | Linux security cookbook |
title_full | Linux security cookbook Daniel J. Barrett ; Richard E. Silverman, and Robert G. Byrnes |
title_fullStr | Linux security cookbook Daniel J. Barrett ; Richard E. Silverman, and Robert G. Byrnes |
title_full_unstemmed | Linux security cookbook Daniel J. Barrett ; Richard E. Silverman, and Robert G. Byrnes |
title_short | Linux security cookbook |
title_sort | linux security cookbook |
topic | Linux Computerbeveiliging gtt Linux gtt Computer networks Security measures Operating systems (Computers) Datensicherung (DE-588)4011144-1 gnd LINUX (DE-588)4337730-0 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Linux Computerbeveiliging Computer networks Security measures Operating systems (Computers) Datensicherung LINUX Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010317315&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT barrettdanielj linuxsecuritycookbook AT silvermanricharde linuxsecuritycookbook AT byrnesrobertg linuxsecuritycookbook |