Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn’t protect against, and whether it would be useful in your environment.
.
http://www.rarefile.net/8c74yalrft6x/LinuxHardeningHostileNetworks.KyleRankin.rar
.
0 Response to this entry.