Practical Linux Security Cookbook

Practical Linux Security Cookbook

by Tajinder Kalsi
English | 2016 | ISBN: 1785286420 | 276 Pages | ePUB | 39 MB

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.

Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.

With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.

With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.

What you will learn:

- Learn about various vulnerabilities and exploits in relation to Linux systems
- Configure and build a secure kernel and test it
- Learn about file permissions and security and how to securely modify files
- Explore various ways to authenticate local users while monitoring their activities.
- Authenticate users remotely and securely copy files on remote systems
- Review various network security methods including firewalls using iptables and TCP Wrapper
- Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
- Understand Bash vulnerability/security and patch management


[Fast Download] Practical Linux Security Cookbook

Ebooks related to "Practical Linux Security Cookbook" :
Hacking: Ultimate Hacking Guide: Hacking For Beginners And Tor Browser
50 Reasons for Mastering Cyber Forensics
Basic Computer Security for Mere Mortals
Fundamentals of IP and SoC Security: Design, Verification, and Debug
Cyber-Physical Security and Privacy in the Electric Smart Grid
Information Security Cost Management
NTP Security: A Quick-Start Guide
Invasion of Privacy! Big Brother and the Company Hackers
E-Mail Security: A Pocket Guide
The 7 Qualities of Highly Secure Software
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.