Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Security (Networking)

Buy
This book provides you with comprehensive knowledge about Linux Security. The book is aimed at readers who are familiar with Linux concepts but now want to gain a solid foundation in Linux security features. It is assumed these readers already understand some Linux and networking concepts, such as network protocols, network servers, and so on. This book contains detailed information to help you fortify your Linux environment and provides questions that enable you to check your understanding at the end of key chapters.

Chapters 1 through 5 cover security basics in the Linux environment. These chapters give you an overview of Linux security, covering the precautions to be taken while installing and administering Linux. This part of the book also gives you an overview of the various authentication and encryption techniques you can use to protect your data.

Chapters 6 through 9 deal with securing networks in the Linux environment. Various kinds of possible network attacks are discussed in this part of the book, and you are given guidelines for preventing these attacks. Securing network servers—such as Apache Web server, FTP server, Sendmail, DNS, and SAMBA—is the core of this second part of the book.

Chapters 10 through 13 focus on preventing intrusion and data recovery. In these chapters, you are provided with an extensive list of signs of intrusions. You will learn to use various tools and security utilities to detect and avoid intrusion.

Maintaining logs regularly is a good practice for system administrators. Logs can give you indications of methods used to attack your system, and at times, you can get information about the attacker as well. Chapter 12, “System Logs,”educates you about using logs. In the last chapter of the book, I discuss the importance of making backups. You’ll realize how important backups are if you ever lose data due to system crashes or other reasons. Various commercial and non-commercial tools that you can use to maintain backups are discussed in this chapter.

Finally, this book also includes several appendices. The appendices include best Linux practices and FAQs for Linux security. An appendix on the future of Linux also is included at the end of the book.
(HTML tags aren't allowed.)

High Performance Computing in Science and Engineering ' 05
High Performance Computing in Science and Engineering ' 05
Extragalactic jets emerge from the cores of bright elliptical galaxies (1). This
is the result of extensive observations on nearby radio galaxies (e.g. 2). Radio
galaxies have, however, been found up to redshifts in excess of five and are
associated with an enormous release of energy, exceeding 1040 watts (3, 4).
Many
...
Virtualizing Microsoft Tier 1 Applications with VMware vSphere 4
Virtualizing Microsoft Tier 1 Applications with VMware vSphere 4

Over the years as power costs have soared and data center space has become scarce and expensive to acquire, enterprises and small businesses have been looking for ways to decrease their data center footprints as well as reduce the overall costs of operating an IT infrastructure. As the number of different applications being deployed in...

Mastering AutoCAD 2000
Mastering AutoCAD 2000
Mastering AutoCAD 2000 is an ideal companion for any engineer who uses the popular CAD program from Autodesk. Its 1,600-plus pages are filled with screen shots, illustrations, notes, and tips that will help new users master the learning curve of AutoCAD. It will also open up the new features of the latest AutoCAD release to users of...

Calculus with Analytic Geometry
Calculus with Analytic Geometry

Most students study calculus for its use as a tool in areas other than mathematics. They desire information about why calculus is important, and where andhow it can be applied. I kept these facts in mind as I wrote this text. In particular, when introducing new concepts I often refer to problems that are familiar to students and that require...

C Programming for Microcontrollers Featuring ATMEL's AVR Butterfly and the free WinAVR Compiler
C Programming for Microcontrollers Featuring ATMEL's AVR Butterfly and the free WinAVR Compiler
Do you want a low cost way to learn C programming for microcontrollers? This book shows you how to use Atmel’s $19.99 AVR Butterfly board and the FREE WinAVR C compiler to make a very inexpensive system for using C to develop microcontroller projects.

Students will find the thorough coverage of C explained in the context of...

Global Energy Policy and Security (Lecture Notes in Energy)
Global Energy Policy and Security (Lecture Notes in Energy)

Despite efforts to increase renewables, the global energy mix is still likely to be dominated by fossil-fuels in the foreseeable future, particularly gas for electricity and oil for land, air and sea transport. The reliance on depleting conventional oil and natural gas resources  and the geographic distribution of these reserves can have...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy