SULJE VALIKKO
KIRJAUDU
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most up-to-date technology available. The content for the Second Edition has been updated to cover the 2.4 kernel, and additional chapters on VPNs, SSH, and Tripwires have been added.
Sisäänkirjautuminen
Kirjaudu sisäänRekisteröityminen |
Oma tili
Omat tiedotOmat tilaukset Omat laskut |
Lisätietoja
AsiakaspalveluTietoa verkkokaupasta Toimitusehdot Tietosuojaseloste |