Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

Buy

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more
  • Master the art of securing a Linux environment with this end-to-end practical guide

Book Description

This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.

By the end of this book, you will be confident in delivering a system that will be much harder to compromise.

What you will learn

  • Use various techniques to prevent intruders from accessing sensitive data
  • Prevent intruders from planting malware, and detect whether malware has been planted
  • Prevent insiders from accessing data that they aren't authorized to access
  • Do quick checks to see whether a computer is running network services that it doesn't need to run
  • Learn security techniques that are common to all Linux distros, and some that are distro-specific

Who This Book Is For

If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.

Table of Contents

  1. Running Linux in a virtual environment
  2. Securing user accounts
  3. Securing your server with a Firewall
  4. Encrypting and SSH Hardening
  5. Mastering Discretionary Access Control
  6. Access Control Lists and Shared Directory Management
  7. Implementing Mandatory Access Control with SELinux and AppArmor
  8. Scanning, Auditing and Hardening
  9. Vulnerability Scanning and Intrusion Detection
  10. Security Tips & Tricks for the Busy Bee
(HTML tags aren't allowed.)

Practical Statecharts in C/C++: Quantum Programming for Embedded Systems with CDROM
Practical Statecharts in C/C++: Quantum Programming for Embedded Systems with CDROM
'Downright revolutionary... the title is a major understatement... 'Quantum Programming' may ultimately change the way embedded software is designed.' -- Michael Barr, Editor-in-Chief, Embedded Systems Programming magazine (Click here

Practical Statecharts in C/C++ illustrates how to
...
MCSA/MCSE 70-290 Exam Prep: Managing and Maintaining a Microsoft Windows Server 2003 Environment (2nd Edition)
MCSA/MCSE 70-290 Exam Prep: Managing and Maintaining a Microsoft Windows Server 2003 Environment (2nd Edition)

MCSA/MCSE

Managing and Maintaining a Microsoft ® Windows Server 2003 Environment

Your Complete Certification Solution!

Exam 70-290

...
Creating a Winning E-Business
Creating a Winning E-Business

Creating a Winning E-Business, Second Edition provides general business students, graduate students, continuing education students, executive education seminar participants, and entrepreneurs with practical ideas on planning and creating an e-business. We assume that readers have no previous e-business knowledge or experience. This book...


Danger Pay: Memoir of a Photojournalist in the Middle East, 1984-1994 (Focus on American History)
Danger Pay: Memoir of a Photojournalist in the Middle East, 1984-1994 (Focus on American History)
"A deeply felt and moving account from an enterprising and conscientious news photographer who worked the always-busy beat of the Middle East in the last, great days of film photography." Rod Nordland, Chief Foreign Correspondent, Newsweek

"Reading Danger Pay was a harrowing experience. Being a photojournalist
...
TypeScript Design Patterns
TypeScript Design Patterns

Key Features

  • This step-by-step guide will would demonstrate all the important design patterns in practice
  • This book is the only documentation on the market focusing on design patterns in TypeScript
  • This book is packed with rich examples that will improve...
Smart Packaging Technologies for Fast Moving Consumer Goods
Smart Packaging Technologies for Fast Moving Consumer Goods

Smart Packaging Technologies for Fast Moving Consumer Goods approaches the subject of smart packaging from an innovative, thematic perspective:

  • Part 1 looks at smart packaging technologies for food quality and safety
  • Part 2 addresses smart packaging issues for the supply chain
  • ...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy