Tripwire - Robert Adams Summary
Tripwire is the gripping saga of one man's struggle against the shadows of war, revealing to all the silent thunder that can continue long after the shelling has stopped. Tripwire strips away the falsehoods that PTSD embeds in its victims, forcing it into the light of truth where it can be seen for what it really is.It is my hope that Tripwire will cut PTSD off at the knees before it can cause irreparable damage. I have learned that PTSD's coup de grace is knowledge and truth. And when you become entangled in its web, it is only these two weapons that can disarm the maze of tripwires this affection throws in your path.A testament to the human spirit's ability to overcome all obstacles, prepare to be catapulted into an adventure with as many twists and turns as the rivers that raged through the mountainous jungles of South Vietnam. Graphic, suspenseful and fast-moving, follow the trail of fear and courage that will challenge you to the very core.So...look out ahead for...tripwires!
Host-based IDS - tripwire, aide - Noite.pl Summary
Tracking modification of files with AIDE or Tripwire is one of the main methods of protecting the system. The micro-course describes popular Host IDS systems, tripwire and AIDE. These are programs for local analysis of the file system and informing the administrator about changes in it. Keywords: aide, tripwire, Host IDS Host-based IDS - tripwire, aideTripwireTripwire installationAIDE (Advanced Intrusion Detection Environment)
Assassin's Tripwire - Don Pendleton Summary
When American high-tech weapons go missing overseas, threatening Syrian and U.S. relations, Mack Bolan races against time to destroy the stolen arms before they can be used, soon discovering that nothing is what it seems as he is forced to play a high stakes game with a beautiful double agent. Original.
Hack Proofing Linux - James Stanger,Patrick T. Lane Summary
From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need Uses forensics-based analysis to give the reader an insight to the mind of a hacker
Tripwire - Bill Chamberlain Summary
Retired Army Colonel Sam Sampson finds himself thrown back into the fight as a totally unexpected North Korean attack preceded by NKPA special purpose forces pours across the De-Militarized Zone into South Korea. Sampson's own son is caught up in the fighting, which makes the fight that much more personal as Sampson struggles to win against a North Korean onslaught that is both sophisticated and brutal. Sampson boldly faces the challenges thrown at him in a winner takes all fight to the finish. Although clearly a fictional account, the story resonates with bluntness and intensity that makes it feel like it has been ripped from today's headlines! It is hauntingly predictive.
Tripwire - Virginia Gilbert Summary
As America prepares for the Vietnam War, Jimmy McCraine and Casey Rice, two small-town boys living in rural Adel, Georgia, must choose between friendship and war. Best friends since childhood, strife and tension threaten to tear their close friendship apart as one chooses a path to heroism. Ever dutiful wives Anne Marie and Regina must face a different war at home as their men leave for a war they wanted nothing to do with. Will Jimmy and Casey remain friends? And will they decide whether honor and duty are worth dying for?
Enterprise Mac Security: Mac OS X Snow Leopard - Charles Edge,William Barker,Beau Hunter,Gene Sullivan,Ken Barker Summary
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats. Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system. Using the SANS Institute course as a sister, this book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience. The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security.
Mastering FreeBSD and OpenBSD Security - Yanek Korff,Paco Hope,Bruce Potter Summary
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms. There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure. FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems. Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate. Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
Ubuntu Unleashed 2015 Edition - Matthew Helmke Summary
Ubuntu Unleashed 2015 Edition is filled with unique and advanced information for everyone who wants to make the most of the Linux-based Ubuntu operating system. This new edition has been thoroughly revised and updated by a long-time Ubuntu community leader to reflect the exciting new Ubuntu 14.10 while including tons of information that will continue to apply to future editions. Former Ubuntu Forum administrator Matthew Helmke covers all you need to know about Ubuntu 14.10 installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more–including intermediate-to-advanced techniques you won’t find in any other book. Helmke presents up-to-the-minute introductions to Ubuntu’s key productivity and Web development tools, programming languages, hardware support, and more. You’ll find new or improved coverage of Ubuntu’s Unity interface, various types of servers, software repositories, database options, virtualization and cloud services, development tools, monitoring, troubleshooting, Ubuntu’s push into mobile and other touch screen devices, and much more. Detailed information on how to… Configure and customize the Unity desktop Get started with multimedia and productivity applications, including LibreOffice Manage Linux services, users, and software packages Administer and run Ubuntu from the command line Automate tasks and use shell scripting Provide secure remote access and configure a secure VPN Manage kernels and modules Administer file, print, email, proxy, LDAP, DNS, and HTTP servers (Apache, Nginx, or alternatives) Learn about new options for managing large numbers of servers Work with databases (both SQL and the newest NoSQL alternatives) Get started with virtualization Build a private cloud with Juju and Charms Learn the basics about popular programming languages including Python, PHP, Perl, and new alternatives such as Go and Rust Learn about Ubuntu’s work toward usability on touch-screen and phone devices Ubuntu 14.10 on DVD DVD includes the full Ubuntu 14.10 distribution for 64 bit computers (most desktop and notebooks systems today) as well as the complete LibreOffice office suite and hundreds of additional programs and utilities. Free Kick Start Chapter! Purchase this book and receive a free Ubuntu 15.04 Kick Start chapter after Ubuntu 15.04 is released. See inside back cover for details
Tripwire - Traci Hunter Abramson Summary
"Jane Napierski is back at work at the job she loves--being a personal assistant to her friend Sienna Blake, a rising star actress. The duo is on location in Virginia Beach to film Sienna's new TV series, along with costar Reed Forrester--the man with whom the world thinks Sienna is in love. Wrong. Sienna's heart actually belongs to her fiance, Craig, a Navy Seal with the Saint Squad. Craig must fly under the radar if he is to keep Sienna safe from this world of terrorists and toxic bombs. And Reed has no problem pretending to date his old friend Sienna simply because it means he can spend time learning more about Jane. Making a TV series is grueling work but not nearly as difficult as the treacherous adventure that is about to begin with a simple photo taken in the wrong place at the wrong time--an image worth killing for. When Craig returns to the United States to spend time with Sienna, he's not expecting to spend that time protecting her and Jane. Frightening incidents targeting the two women rapidly escalate, and as Craig and his Saint Squad investigate a tangled conspiracy, they find themselves tracking, here at home, the terrorists they have searched for across the globe. But can they shut the terrorists down in time to save Jane, Reed, and Sienna?"--
Linux System Security - Scott Mann,Ellen L. Mitchell Summary
This title looks at the pros and cons of open source security tools and demonstrates how to implement them. It also provides coverage of Bastille. The text includes detailed instructions, as well as essential background information.
Botnets - Craig Schiller,James R. Binkley Summary
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself