Hardening Apache
The market at the moment is literally overflowing with books about computer security. Most of them try to be "complete guides," and are supposed to teach anyone how to be perfect Internet security experts (or, possibly, perfect crackers). Even though I believe in comprehensive teachings...
Đã lưu trong:
Tác giả chính: | |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
Apress
2012
|
Những chủ đề: | |
Truy cập trực tuyến: | http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/31403 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-31403 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-314032012-08-15T00:50:01Z Hardening Apache Mobily, Tony Technologies The market at the moment is literally overflowing with books about computer security. Most of them try to be "complete guides," and are supposed to teach anyone how to be perfect Internet security experts (or, possibly, perfect crackers). Even though I believe in comprehensive teachings, I have the feeling that the amount of knowledge one must have in order to be a well-rounded security expert is far too extended to fit in a single book. It is in fact a coin with many intricate sides. For example, a person with a programming background would probably say that to be considered a "real" Internet security expert, you must know how to code in C; how to use sockets (normal ones and raw ones); how many protocols and RFCs work; how to implement a protocol by hand; how buffer overflows work, and how to prevent them; how to read and audit other people's code; and so on. On the other hand, a person with a system administration background will point out that in order to keep a server secure, you need to know how to install and configure software properly; how to set up an effective logging system; how to create an automatic checking procedure; how to prevent and face the most common attacks; how to find the most important and relevant security information and mailing list; how to update your server before a cracker has a chance to attack it using a new vulnerability; how to install intrusion detection systems; how to have effective disaster recovery procedures in place; and so on. 2012-08-15T00:50:01Z 2012-08-15T00:50:01Z 2004 Book 1590593782 http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/31403 en application/chm Apress |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
topic |
Technologies |
spellingShingle |
Technologies Mobily, Tony Hardening Apache |
description |
The market at the moment is literally overflowing with books about computer security. Most of them try to be "complete guides," and are supposed to teach anyone how to be perfect Internet security experts (or, possibly, perfect crackers).
Even though I believe in comprehensive teachings, I have the feeling that the amount of knowledge one must have in order to be a well-rounded security expert is far too extended to fit in a single book. It is in fact a coin with many intricate sides.
For example, a person with a programming background would probably say that to be considered a "real" Internet security expert, you must know how to code in C; how to use sockets (normal ones and raw ones); how many protocols and RFCs work; how to implement a protocol by hand; how buffer overflows work, and how to prevent them; how to read and audit other people's code; and so on.
On the other hand, a person with a system administration background will point out that in order to keep a server secure, you need to know how to install and configure software properly; how to set up an effective logging system; how to create an automatic checking procedure; how to prevent and face the most common attacks; how to find the most important and relevant security information and mailing list; how to update your server before a cracker has a chance to attack it using a new vulnerability; how to install intrusion detection systems; how to have effective disaster recovery procedures in place; and so on. |
format |
Book |
author |
Mobily, Tony |
author_facet |
Mobily, Tony |
author_sort |
Mobily, Tony |
title |
Hardening Apache |
title_short |
Hardening Apache |
title_full |
Hardening Apache |
title_fullStr |
Hardening Apache |
title_full_unstemmed |
Hardening Apache |
title_sort |
hardening apache |
publisher |
Apress |
publishDate |
2012 |
url |
http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/31403 |
_version_ |
1757668977544265728 |