Red Hat Linux security and optimization (Record no. 11648)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01736nam a2200229 a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 0764547542 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780764547546 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 8126502487 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9788126502486 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.43 |
Item number | KAB |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Kabir, Mohammed J. ; |
245 ## - TITLE STATEMENT | |
Title | Red Hat Linux security and optimization |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | New Delhi : |
Name of publisher | Wiley Dreamtech India (P) Ltd., |
Year of publication | ©2002. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xvi, 690 p. : |
Other physical details | illustrations ; |
Accompanying material | + 1 CD-ROM (4 3/4 in.) |
500 ## - GENERAL NOTE | |
General note | Included Index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | pt. I. System Performance --<br/>Ch. 1. Performance Basics --<br/>Ch. 2. Kernel Tuning --<br/>Ch. 3. Filesystem Tuning --<br/>pt. II. Network and Service Performance --<br/>Ch. 4. Network Performance --<br/>Ch. 5. Web Server Performance --<br/>Ch. 6. E-Mail Server Performance --<br/>Ch. 7. NFS and Samba Server Performance --<br/>pt. III. System Security --<br/>Ch. 8. Kernel Security --<br/>Ch. 9. Securing Files and Filesystems --<br/>Ch. 10. PAM --<br/>Ch. 11. OpenSSL --<br/>Ch. 12. Shadow Passwords and OpenSSH --<br/>Ch. 13. Secure Remote Passwords --<br/>Ch. 14. xinetd --<br/>pt. IV. Network Service Security --<br/>Ch. 15. Web Server Security --<br/>Ch. 16. DNS Server Security --<br/>Ch. 17. E-Mail Server Security --<br/>Ch. 18. FTP Server Security --<br/>Ch. 19. Samba and NFS Server Security --<br/>pt. V. Firewalls --<br/>Ch. 20. Firewalls, VPNs, and SSL Tunnels --<br/>Ch. 21. Firewell Security Tools --<br/>App. A. IP Network Address Classification --<br/>App. B. Common Linux Commands --<br/>App. C. Internet Resources --<br/>App. D. Dealing with Compromised Systems. |
520 ## - SUMMARY, ETC. | |
Summary, etc | CD-ROM contains: Book chapters in searchable PDF format -- Sample book scripts in text format -- Security tools. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Linux. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Operating systems (Computers) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Reference Books |
Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|---|---|---|---|
Reference | Main Library | Main Library | Reference | 27/01/2004 | Purchased | 997.50 | 005.43 KAB | 008289 | Reference Books |