登入選單
返回Google圖書搜尋
註釋This guide aims to provide systems administrators with insights into how to find and exploit security holes in Linux - and how they can be fixed. It covers vulnerabilities found on common Linux distributions, for example, Red Hat and SuSE.