Hardening Apache

The market at the moment is literally overflowing with books about computer security. Most of them try to be "complete guides," and are supposed to teach anyone how to be perfect Internet security experts (or, possibly, perfect crackers). Even though I believe in comprehensive teachings...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Mobily, Tony
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: Apress 2012
Những chủ đề:
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/31403
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
Miêu tả
Tóm tắt:The market at the moment is literally overflowing with books about computer security. Most of them try to be "complete guides," and are supposed to teach anyone how to be perfect Internet security experts (or, possibly, perfect crackers). Even though I believe in comprehensive teachings, I have the feeling that the amount of knowledge one must have in order to be a well-rounded security expert is far too extended to fit in a single book. It is in fact a coin with many intricate sides. For example, a person with a programming background would probably say that to be considered a "real" Internet security expert, you must know how to code in C; how to use sockets (normal ones and raw ones); how many protocols and RFCs work; how to implement a protocol by hand; how buffer overflows work, and how to prevent them; how to read and audit other people's code; and so on. On the other hand, a person with a system administration background will point out that in order to keep a server secure, you need to know how to install and configure software properly; how to set up an effective logging system; how to create an automatic checking procedure; how to prevent and face the most common attacks; how to find the most important and relevant security information and mailing list; how to update your server before a cracker has a chance to attack it using a new vulnerability; how to install intrusion detection systems; how to have effective disaster recovery procedures in place; and so on.