SULJE VALIKKO
KIRJAUDU
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a small non-enterprise business user might take to protect themselves when dealing with what the attacker may gain and what a victim may lose. These steps include packet-level firewall filtering, IP masquerading, proxies, tcp wrappers, system integrity checking, and system security monitoring with an overall emphasis on filtering and protection. This book will provide a description of the need for security measures and solutions. The goal is to help people get their Internet security measures in place quickly, without the need to become an expert in security or firewalls.
Sisäänkirjautuminen
Kirjaudu sisäänRekisteröityminen |
Oma tili
Omat tiedotOmat tilaukset Omat laskut |
Lisätietoja
AsiakaspalveluTietoa verkkokaupasta Toimitusehdot Tietosuojaseloste |