LEADER 01005cam0-22003131i-450- 001 990006045540403321 005 19980601 010 $a3-16-641371-5 035 $a000604554 035 $aFED01000604554 035 $a(Aleph)000604554FED01 035 $a000604554 100 $a19980601d1979----km-y0itay50------ba 101 0 $ager 102 $aDE 105 $ay-------001yy 200 1 $aRechtsfragen des lebenslangen Lernens$eeine vergleichende untersuchung zum deutschen franzosischen, englischen und amerikanischen verfassungsrecht$fvon Ulrich Karpen 210 $aTübingen$cMohr$dc1979 215 $a72 p.$d23 cm 225 1 $aRecht und Staat in Geschichte und Gegenwart$x0340-7012$v490/491 676 $a340.2$v20$zita 700 1$aKarpen,$bUlrich$0230331 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006045540403321 952 $aCOLLEZIONE 24 (490/491)$b4197*$fFGBC 959 $aFGBC 996 $aRechtsfragen des lebenslangen Lernens$9577679 997 $aUNINA LEADER 02880nam 2200541 a 450 001 9910961780603321 005 20251116142408.0 010 $a1-281-05290-6 010 $a9786611052904 010 $a0-08-047811-5 035 $a(CKB)111035898513110 035 $a(EBL)294152 035 $a(OCoLC)808614799 035 $a(SSID)ssj0000166769 035 $a(PQKBManifestationID)11153189 035 $a(PQKBTitleCode)TC0000166769 035 $a(PQKBWorkID)10162006 035 $a(PQKB)11458702 035 $a(MiAaPQ)EBC294152 035 $a(EXLCZ)99111035898513110 100 $a20020923d2001 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHack proofing Linux: a guide to open source security $ethe only way to stop a hacker is to think like one /$fJames Stanger, Patrick T. Lane 205 $a1st ed. 210 $aRockland, Mass. $cSyngress Media ;$aLondon $cInternational Thomson$dc2001 215 $a1 online resource (705 p.) 300 $aIncludes index. 300 $aOne CD-ROM in pocket attached to inside back cover. 311 08$a1-928994-34-2 327 $a1928994342.pdf; 1928994342.pdf; Cover; Table of Contents; Preface; Chapter 1 Introduction to Open Source Security; Chapter 2 Hardening the Operating System; Chapter 3 System Scanning and Probing; Chapter 4 Implementing an Intrusion Detection System; Chapter 5 Troubleshooting the Network with Sniffers; Chapter 6 Network Authentication and Encryption; Chapter 7 Avoiding Sniffing Attacks through Encryption; Chapter 8 Creating Virtual Private Networks; Chapter 9 Implementing a Firewall with Ipchains and Iptables; Chapter 10 Deploying the Squid Web Proxy Cache Server 327 $aChapter 11 Maintaining FirewallsAppendix A Bastille Log; Appendix B Hack Proofing Linux Fast Track; Index; Related Titles 330 $aFrom the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and ant 606 $aComputer security 615 0$aComputer security. 676 $a005.8 700 $aStanger$b James$0627564 701 $aLane$b Patrick$g(Patrick T.)$01890399 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910961780603321 996 $aHack proofing Linux: a guide to open source security$94532269 997 $aUNINA