Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Linux : A Guide to Open Source Security

Buy
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain the software; and then, how to use the Bastille application to “harden” your Linux operating system so that it can function securely as it fulfills a specific role of your choice (e.g., as a Web server, as an E-mail server, and so forth).You will also learn how to use your Linux system as an auditing tool to scan systems for vulnerabilities as well as create an Intrusion Detection System (IDS), which enables your Linux system to log and respond to suspicious activity. From virus protection to encrypting transmissions using Gnu Privacy Guard and FreeSWAN, you will be able to configure your system to secure local data as well as data that will be passed along the network. After reading this book, you will be able to identify open source and “for-fee” tools that can help you further secure your Linux system.

The Linux operating system continues to gain market share, based largely on its reputation as the most secure operating system available. The challenge faced by system administrators is that Linux is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. Hack Proofing Linux provides the system administrator with coverage of the most popular Linux operating systems and Open Source security tools, along with the techniques necessary to properly configure and maintain Linux systems and to counter malicious attacks.

About the Author
James Stanger (Ph.D., MCSE, MCT) directs the Linux, Security, and Server Administrator certification tracks for ProsoftTraining.com. Since receiving his Ph.D. in 1997, he has focused on auditing Internet servers and writing courseware, books, and articles about administering and securing Internet servers.He specializes in troubleshooting firewall, intrusion detection, DNS, e-mail and Web server implementations.

Patrick T. Lane (MCSE, MCP+I, MCT, Network+, i-Net+, CIW) is a Content Architect for ProsoftTraining.com, a leading Internet skills training and curriculum development company. He is the author of more than 20 technical courses and is the director of the CIW Foundations and CIW Internetworking Professional series. While at ProsoftTraining.com, he has helped create the Certified Internet Webmaster (CIW) program and the i-Accelerate program for Intel, Novell, and Microsoft professionals.

Edgar Danielyan (CCNA) is currently self-employed. Edgar has a diploma in company law from the British Institute of Legal Executives, and is a certified paralegal from the University of Southern Colorado. He has been working as a network administrator and manager of a top-level domain of Armenia. He has also worked for the United Nations, the Ministry of Defense, a national telco, a bank, and has been a partner in a law firm.

(HTML tags aren't allowed.)

Axioms and Hulls (Lecture Notes in Computer Science)
Axioms and Hulls (Lecture Notes in Computer Science)

A FEW YEARS AGO some students and I were looking at a map that pinpointed the locations of about loo cities. We asked ourselves, "Which of these cities are neighbors of each other?" We knew intuitively that some pairs of cities were neighbors and others were not; we wanted to find a formal mathematical characterization that...

Parallel Programming with Intel Parallel Studio XE (Wrox Programmer to Programmer)
Parallel Programming with Intel Parallel Studio XE (Wrox Programmer to Programmer)

Nearly all the computers sold today have a multi-core processor, but only a small number of applications are written to take advantage of the extra cores. Most programmers are playing catch-up. A recent consultation with a group of senior programming engineers revealed the top three hurdles in adopting parallelism: the challenges of porting...

Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications (The Butterworth-Heinemann Homeland Security Series)
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and "all hazards" emergency management. The book presents national, state, and local perspectives and up-to-date information, including the reorganization of the...

Apple Pro Training Series: Motion 5
Apple Pro Training Series: Motion 5

 

Welcome to the official Apple Pro Training course for Motion 5, a behavior-driven motion graphics application that allows you to create stunning visual effects for a wide variety of projects.

This book is a comprehensive guide to designing with Motion. It covers the use of
...
Pinnacle Studio 9 Ignite!
Pinnacle Studio 9 Ignite!
Covering the popular video editing and DVD authoring software that is used by 3.5 million users, "Pinnacle Studio 9 Ignite!" is a visual guide that will have you up and running in no time. With the many enhancements of Pinnacle Studio 9, this book is not only suitable for beginners, but also for users of Pinnacle looking to brush up on...
Applied Software Project Management
Applied Software Project Management
What makes software projects succeed? It takes more than a good idea and a team of talented programmers. A project manager needs to know how to guide the team through the entire software project. There are common pitfalls that plague all software projects and rookie mistakes that are made repeatedly--sometimes by the same people! Avoiding these...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy