Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

Buy

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more
  • Master the art of securing a Linux environment with this end-to-end practical guide

Book Description

This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.

By the end of this book, you will be confident in delivering a system that will be much harder to compromise.

What you will learn

  • Use various techniques to prevent intruders from accessing sensitive data
  • Prevent intruders from planting malware, and detect whether malware has been planted
  • Prevent insiders from accessing data that they aren't authorized to access
  • Do quick checks to see whether a computer is running network services that it doesn't need to run
  • Learn security techniques that are common to all Linux distros, and some that are distro-specific

Who This Book Is For

If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.

Table of Contents

  1. Running Linux in a virtual environment
  2. Securing user accounts
  3. Securing your server with a Firewall
  4. Encrypting and SSH Hardening
  5. Mastering Discretionary Access Control
  6. Access Control Lists and Shared Directory Management
  7. Implementing Mandatory Access Control with SELinux and AppArmor
  8. Scanning, Auditing and Hardening
  9. Vulnerability Scanning and Intrusion Detection
  10. Security Tips & Tricks for the Busy Bee
(HTML tags aren't allowed.)

Artificial Neural Networks with Java: Tools for Building Neural Network Applications
Artificial Neural Networks with Java: Tools for Building Neural Network Applications
Use Java to develop neural network applications in this practical book. After learning the rules involved in neural network processing, you will manually process the first neural network example. This covers the internals of front and back propagation, and facilitates the understanding of the main principles of neural...
Handbook of Video Databases: Design and Applications
Handbook of Video Databases: Design and Applications

This handbook presents a thorough overview in 45 chapters from more than 100 renowned experts in the field. It provides the tools to help overcome the problems of video storage, cataloging, and retrieval, by exploring content standardization and other content classification and analysis methods. The challenge of these complex problems make...

Beta Testing for Better Software
Beta Testing for Better Software
Implement, operate, and use beta testing immediately with this hands-on guide to the best practices

Beta testing is a complex process that, when properly run, provides a wealth of diverse information. But when poorly executed, it delivers little or no data while wasting time and money. Written by a leading expert in the field, this book will...


Java 2 Platform, Enterprise Edition: Platform and Component Specifications
Java 2 Platform, Enterprise Edition: Platform and Component Specifications

The Java 2(TM) Platform, Enterprise Edition (J2EE) defines a new standard in enterprise solutions through a simplified, component-based development model. By extending the "write-once, run-anywhere(TM)" benefits of the Java programming language to enterprise servers, J2EE adds the scalability, robustness, and...

Google+ for Photographers
Google+ for Photographers

Prior to Google+, Photographers relied on a mix of Twitter, Facebook, Flickr, and other services to display their work and interact with others. No single service provided photographers with a complete set of tools that allowed them to connect with others in a rich, meaningful way–until now.

Unlike other social
...

Enhancing Microsoft Content Management Server with ASP.NET 2.0
Enhancing Microsoft Content Management Server with ASP.NET 2.0
The release of Microsoft Content Management Server (MCMS) Service Pack 2 opens up the world of ASP.NET 2.0 to MCMS developers. Written by the masters of MCMS, this book shows you how to use the new features of ASP.NET 2.0 that everyone is talking about in your MCMS development. You will first learn how to install and configure MCMS SP2. There are...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy