Linux Security: Craig Hunt Linux Library
4/5
()
Currently unavailable
Currently unavailable
About this ebook
This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threats of all kinds. Hundreds of clear, consistent examples illustrate these techniques in detail†so you stay on track and accomplish all your goals. Coverage includes:
- Understanding information and system security procedures
- Developing a corporate security policy
- Designing and deploying an effective system and network monitoring strategy
- Managing the network services offered by Linux servers
- Understanding Sendmail security, including authentication and privacy
- Providing application-level mail security using PGP
- Designing and deploying an Apache HTTP server, including SSL extensions
- Securing your Samba server
- Building a network layer firewall using IPtables and Linux kernel v.2.4
- Using the NEC SOCKS5 transport layer firewall
- Deploying the TIS firewall toolkit
- Offering secure remote connectivity with IPsec and PPTP VPNs
- Adding strong user authentication to Linux servers using Kerberos
- Understanding the Linux Pluggable Authentication Modules (PAM)
Related to Linux Security
Related ebooks
Scene of the Cybercrime Rating: 4 out of 5 stars4/5Alan Simpson's Windows XP Bible Rating: 0 out of 5 stars0 ratingsKali Linux CTF Blueprints Rating: 0 out of 5 stars0 ratingsSecrets and Lies: Digital Security in a Networked World Rating: 4 out of 5 stars4/5The Art of Rails Rating: 0 out of 5 stars0 ratingsBecome An Ethical Hacker That Can Hack Computer Systems And Secure Them Like Security Experts Rating: 0 out of 5 stars0 ratingsInformation Security Best Practices: 205 Basic Rules Rating: 0 out of 5 stars0 ratingsBluetooth Application Programming with the Java APIs Essentials Edition Rating: 5 out of 5 stars5/5CNET Do-It-Yourself Home Networking Projects Rating: 0 out of 5 stars0 ratingsMaking Sense of Cybersecurity Rating: 0 out of 5 stars0 ratingsOWNED: Why hacking continues to be a problem Rating: 0 out of 5 stars0 ratingsSemantics in Business Systems: The Savvy Manager's Guide Rating: 3 out of 5 stars3/5Full Stack Python Security: Cryptography, TLS, and attack resistance Rating: 0 out of 5 stars0 ratingsReconfigurable Computing: The Theory and Practice of FPGA-Based Computation Rating: 0 out of 5 stars0 ratingsHack Computer System For Noobee Rating: 1 out of 5 stars1/5Kismet Hacking Rating: 0 out of 5 stars0 ratingsIntelligent Sensor Design Using the Microchip dsPIC Rating: 0 out of 5 stars0 ratingsCSS Hacks and Filters: Making Cascading Stylesheets Work Rating: 3 out of 5 stars3/5Digital Watermarking and Steganography Rating: 5 out of 5 stars5/5Practical Suggestions For Microsoft Windows Rating: 4 out of 5 stars4/5IMS Multimedia Telephony over Cellular Systems: VoIP Evolution in a Converged Telecommunication World Rating: 0 out of 5 stars0 ratingsCode Leader: Using People, Tools, and Processes to Build Successful Software Rating: 5 out of 5 stars5/5Learning iOS UI Development Rating: 0 out of 5 stars0 ratingsESL Design and Verification: A Prescription for Electronic System Level Methodology Rating: 0 out of 5 stars0 ratingsCryptography for Developers Rating: 3 out of 5 stars3/5Ethereal Packet Sniffing Rating: 0 out of 5 stars0 ratingsSystem Administration Ethics: Ten Commandments for Security and Compliance in a Modern Cyber World Rating: 0 out of 5 stars0 ratingsDesignus Maximus Unleashed! Rating: 0 out of 5 stars0 ratingsProgramming Multi-Agent Systems in AgentSpeak using Jason Rating: 3 out of 5 stars3/5Configuring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratings
Operating Systems For You
Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5PowerShell: A Comprehensive Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Exploring Windows 11: The Illustrated, Practical Guide to Using Microsoft Windows Rating: 0 out of 5 stars0 ratingsCompTIA Linux+ Study Guide: Exam XK0-004 Rating: 0 out of 5 stars0 ratingsLinux: Learn in 24 Hours Rating: 5 out of 5 stars5/5The Mac Terminal Reference and Scripting Primer Rating: 4 out of 5 stars4/5Make Your PC Stable and Fast: What Microsoft Forgot to Tell You Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Mastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsBash Command Line Pro Tips Rating: 5 out of 5 stars5/5Networking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsLinux Command Line and Shell Scripting Bible Rating: 3 out of 5 stars3/5Darknet Rating: 4 out of 5 stars4/5Windows 11 For Dummies Rating: 0 out of 5 stars0 ratingsThe Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5Windows 10 All-In-One For Dummies Rating: 4 out of 5 stars4/5Windows 11 All-in-One For Dummies Rating: 5 out of 5 stars5/5Windows Server 2019 & PowerShell All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5OneNote: The Ultimate Guide on How to Use Microsoft OneNote for Getting Things Done Rating: 1 out of 5 stars1/5iPhone Unlocked Rating: 0 out of 5 stars0 ratingsWindows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5The Linux Command Line Beginner's Guide Rating: 4 out of 5 stars4/5Raspberry Pi Cookbook for Python Programmers Rating: 0 out of 5 stars0 ratings
Reviews for Linux Security
1 rating0 reviews