Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Securing Linux

Buy
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. But this was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact OPPOSITE story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers.

2005: Linux Server market share 24% (Source: IDC)
2005: Number of published Linux Security books: 25
2005-2007: Linux Server market share increases to 33% (Source: IDC)
2005-2007: Number of new books published on Linux Security: 0

The Perfect Reference for the Multitasked SysAdmin

* Discover Why "Measure Twice, Cut Once" Applies to Securing Linux
* Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases
* Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job

About the Author

Dr. James Stanger leads Prosoft's broad activities in certification as well as the company's well-respected product development capabilities. Dr. Stanger joined the company in 1997. Following many years as a key leader in the company's product development area, he was named Director of the group in May 2003. He was promoted to Vice President, Certification and Product Development in December 2003. Dr. Stanger is very active in the certification community. He has helped develop certifications for Symantec, the Linux Professional Institute (LPI), CompTIA, and the Telecommunications Industry Association (TIA). He is currently Chair of the LPI Advisory Council and sits on the CompTIA Network+ and Linux+ cornerstone committees.

Dr. Stanger is a prolific author. A sample of the titles he has either written or contributed to include The Windows to Linux Migration Toolkit (Syngress), Security+ (ComputerPREP), Hack Proofing Linux (Syngress), The E-mail Virus Protection Handbook (Syngress), and The CIW Security Professional Study Guide (Sybex).
An accomplished networking consultant, Dr. Stanger has advised customers such as Symantec, the TIA, Securify, Fuelzone.com, and IBM concerning Internet security, convergence technology, and Windows to Linux migration.

Prior to joining Prosoft, Dr. Stanger was an educator and consultant, holding teaching positions at the University of California at Riverside, the University of Redlands, and Crafton Hills College. Dr. Stanger earned a B.A. and a Masters degree from Brigham Young University and a Ph.D. from the University of California at Riverside. He is a CIW Master Administrator, and also holds the Linux+, Security+, A+, and Convergence Technologies Professional (CTP) certifications.
(HTML tags aren't allowed.)

Break Into The Game Industry: How to Get A Job Making Video Games
Break Into The Game Industry: How to Get A Job Making Video Games
Find out from an industry veteran exactly what you need to do to become a game designer, tester, artist, producer, programmer, writer, soundtrack composer, videographer, or sales/marketing professional. You’ll get full-spectrum coverage of positions available within the game industry as well as details on how a game is created--from start to...
Graph Transformations: Second International Conference, ICGT 2004, Rome, Italy, September 28 - October 1, 2004, Proceedings (Lecture Notes in Computer Science)
Graph Transformations: Second International Conference, ICGT 2004, Rome, Italy, September 28 - October 1, 2004, Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the Second International Conference on Graph Transformation, ICGT 2004, held in Rome, Italy, in September/October 2004.

The 26 revised full papers presented together with three invited contributions and summaries of 2 tutorials and 5 workshops were carefully reviewed and selected from 58...

Data Warehousing: Using the Wal-Mart Model (The Morgan Kaufmann Series in Data Management Systems)
Data Warehousing: Using the Wal-Mart Model (The Morgan Kaufmann Series in Data Management Systems)
At 70 terabytes and growing, Wal-Mart's data warehouse is still the world's largest, most ambitious, and arguably most successful commercial database. Written by one of the key figures in its design and construction, Data Warehousing: Using the Wal-Mart Model gives you an insider's view of this enormous project. Continuously drawing from...

Building WordPress Themes from Scratch
Building WordPress Themes from Scratch

Walk through the steps you need to build your very own WordPress theme! Included with the book is a WordPress theme and other necessary files, so roll up your sleeves and let Joe take you through the process explaining what you need to do - and why you’re doing it - every step of the way. Hi, I’m Joe, the author of Building...

PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting
PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting

This pocket reference has been updated with the new PHP 8 release. It is a condensed, code-rich scripting and syntax handbook for the PHP scripting language. You won’t find any technical jargon, bloated samples, drawn-out history lessons or witty stories in this book. What you will find is a web scripting language...

Programming the PIC Microcontroller with MBASIC (Embedded Technology)
Programming the PIC Microcontroller with MBASIC (Embedded Technology)
The Microchip PIC family of microcontrollers is the most popular series of microcontrollers in the world. However, no microcontroller is of any use without software to make it perform useful functions. This comprehensive reference focuses on designing with Microchips mid-range PIC line using MBASIC, a powerful but easy to learn programming...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy