oreilly - selinux open source security enhanced linux - 2004

oreilly - selinux open source security enhanced linux - 2004

oreilly - selinux open source security enhanced linux - 2004

... Associates SELinux http://opensource.nailabs.com /selinux Russell Coker's SELinux http://www.coker.com.au /selinux SELinux for Debian http://www.microcomaustralia.com.au/debian SELinux ... Distributions http:/ /selinux. sourceforge.net SELinux for Fedora Core http://fedora.redhat.com/projects /selinux SELinux for Gentoo Linux http://www.gentoo.org/proj/en/har...
Ngày tải lên : 08/07/2014, 01:42
  • 234
  • 862
  • 0
hack proofing linux - your guide to open source security

hack proofing linux - your guide to open source security

... Page 56 Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides prac- tical instructions ... System Login Security Daemons (Web, FTP, and so forth) Enhanced Logging Virus Protection and Intrusion Detection 138 _linux_ 01 6/20/01 9:26 AM Page 31 Introduction to Open Sou...
Ngày tải lên : 25/03/2014, 11:18
  • 705
  • 336
  • 0
Open Source Security Tools pptx

Open Source Security Tools pptx

... Resources to the Project 386 Patronize Companies That Use or Support Open Source Products 387 More Open Source Security Tools 387 Appendix A Open Source Licenses 389 Appendix B Basic Linux/ UNIX ... June 29, 2004 3:08 PM Open Source History 13 Open Source History The open source software movement has its roots in the birth of the UNIX platform, which is why m...
Ngày tải lên : 09/03/2014, 00:20
  • 600
  • 314
  • 0
how to cheat at configuring open source security tools - the perfect reference for the multitasked sysadmin

how to cheat at configuring open source security tools - the perfect reference for the multitasked sysadmin

... example, in the CUSTOM chain you could replace iptables -A CUSTOM -p tcp -s 192.168.1.11 dport 22 -j ACCEPT with iptables -A CUSTOM dport 22 -j ACCEPT. This is because the packet would not be in ... 1.16 Nessus Client-Server Operation After the install is complete, you must create a user for the Nessus server.This is done by exe- cuting /opt/nessus/sbin/nessus-add-first-user. Enter a username...
Ngày tải lên : 25/03/2014, 11:23
  • 530
  • 542
  • 0
tiểu luận  security enhanced linux

tiểu luận security enhanced linux

... Chí Minh-11/2009 1 I- TỔNG QUAN VỀ SELINUX: 1.1 SELinux là gì? SeLinux là các phiên bản Linux có gia cố thêm hệ thống bảo mật của Hệ điều hành. Nghĩa là nó vẫn là một phiên bản linux bình ... hiển thị security context của các tiến trình trong hệ thống Id –Z : hiển thị cho user, role và type của user hiện thời. 2.2 So sánh giữa Linux chuẩn và SeLinux. Để hiểu rõ hơ...
Open Source Security Tools : Practical Guide to Security Applications part 60 pdf

Open Source Security Tools : Practical Guide to Security Applications part 60 pdf

... 387 permission to release code as open source, 265 providing resources to, 386–387 Open source security tools, xix–xxi Open source software, xi, 12 100 percent outsourced IT, 20 advantages, 15–19 BSD ... 384–387 providing resources to project, 386–387 Open source operating systems, 27 Open source projects, 264 broader need for, 265 NCC (Nessus Command Center), 266–277 pat...
Ngày tải lên : 04/07/2014, 13:20
  • 10
  • 369
  • 0
Open Source Security Tools : Practical Guide to Security Applications part 1 ppsx

Open Source Security Tools : Practical Guide to Security Applications part 1 ppsx

... cm. Includes index. ISBN 0-3 2 1-1 944 3-8 (pbk. : alk. paper) 1. Computer security. 2. Computer networks Security measures. 3. Open source software. I. Title. QA76.9.A25H6985 2004 005.8—dc22 20040 09479 Copyright ... June 29, 2004 2:38 PM Visit Prentice Hall on the Web: www.phptr.com Library of Congress Cataloging-in-Publication Data Howlett, Tony. Open source security...
Ngày tải lên : 04/07/2014, 13:20
  • 10
  • 306
  • 0
Open Source Security Tools : Practical Guide to Security Applications part 2 docx

Open Source Security Tools : Practical Guide to Security Applications part 2 docx

... Wednesday, June 30, 2004 9:54 AM Preface xv Chapter 12: More On Open Source Software Finally, this chapter will give you resources for finding out more about open source soft- ware. Various key ... and other Internet-based resources are identi- fied. Also, I give a number of ways to become more involved in the open source movement if you so desire. Appendix A: Common Open Sou...
Ngày tải lên : 04/07/2014, 13:20
  • 10
  • 368
  • 0
Open Source Security Tools : Practical Guide to Security Applications part 3 ppt

Open Source Security Tools : Practical Guide to Security Applications part 3 ppt

... information security and the background of open source software. The Practice of Information Security The discipline of information security (often shortened to info -security) has many differ- ent ... money. Howlett_CH01.fm Page 3 Wednesday, June 23, 2004 2:58 PM 4 Chapter 1 • Information Security and Open Source Software You too can use open source software to secure...
Ngày tải lên : 04/07/2014, 13:20
  • 10
  • 348
  • 0
Open Source Security Tools : Practical Guide to Security Applications part 4 pptx

Open Source Security Tools : Practical Guide to Security Applications part 4 pptx

... resources Howlett_CH01.fm Page 13 Wednesday, June 23, 2004 2:58 PM Open Source Advantages 15 Open Source Advantages You and your company can use open source both to cut costs and improve your security. The ... reasons why open source security tools might make sense for you and your company. Cost It’s hard to beat free! Although open source does not necessarily alway...
Ngày tải lên : 04/07/2014, 13:20
  • 10
  • 379
  • 0

Xem thêm