LEADER 00932nam a2200241 i 4500 001 991000843989707536 005 20020507102215.0 008 951030s1976 it ||| | ita 035 $ab1013749x-39ule_inst 035 $aLE00637820$9ExL 040 $aDip.to Fisica$bita 084 $a912 110 2 $aRegione Emilia Romagna$040146 245 10$aCarta tecnica regionale :$b[Emilia Romagna] /$ca cura della Regione Emilia-Romagna 260 $aBologna :$b[s.n.],$c1976 300 $a70 p. :$bill. ;$c30 cm. 500 $aFormazione della C.T.R. Capitolatospeciale d'appalto. Norme per il disegno e segni convenzionali. 907 $a.b1013749x$b21-09-06$c27-06-02 912 $a991000843989707536 945 $aLE006 912 REG$g1$i2006000050098$lle006$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i10162483$z27-06-02 996 $aCarta tecnica regionale$9185583 997 $aUNISALENTO 998 $ale006$b01-01-95$cm$da $e-$fita$git $h0$i1 LEADER 02788nam a2200373Ii 4500 001 991003253059707536 006 m d 007 cr cn||||||||| 008 070806s2001 mau s 001 0 eng d 020 $a9781928994343 020 $a1928994342 035 $ab13655929-39ule_inst 037 $a100773:100781$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aStanger, James.$0627564 245 10$aHack proofing Linux$h[electronic resource] :$ba guide to open source security /$cJames Stanger. 260 $aRockland, Mass. :$bSyngress Media ;$aLondon :$bInternational Thomson,$c2001. 300 $a528 p. ;$c23 cm. +$e1 computer disk (digital ; 4 3/4 in.) 500 $aIncludes index. 520 $aFrom the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. * Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need * CD-Rom contains Red Hat/Mandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community * Uses forensics-based analysis to give the reader an insight to the mind of a hacker. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 630 00$aLinux. 650 0$aComputer security. 655 7$aElectronic books.$2local 776 1 $cOriginal$z1928994342$z9781928994343$w(OCoLC)48677633 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781928994343$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655929$b24-02-22$c24-01-08 912 $a991003253059707536 994 $aC0$bTEF 996 $aHack proofing Linux$91213126 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0