images
CHAPTER 15
Network Security
images
images
In Chapter 14, you learned that exploit vectors are of two types: those in which the vulnerability is exploitable locally and those in which the vulnerability is exploitable over a network. The former case was covered in Chapter 14. The latter case is covered in this chapter.
Network security addresses the problem of attackers sending malicious network traffic to your system with the intent of either making your system ...

Get Linux Administration: A Beginners Guide, Sixth Edition, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.