Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

Buy

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more
  • Master the art of securing a Linux environment with this end-to-end practical guide

Book Description

This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.

By the end of this book, you will be confident in delivering a system that will be much harder to compromise.

What you will learn

  • Use various techniques to prevent intruders from accessing sensitive data
  • Prevent intruders from planting malware, and detect whether malware has been planted
  • Prevent insiders from accessing data that they aren't authorized to access
  • Do quick checks to see whether a computer is running network services that it doesn't need to run
  • Learn security techniques that are common to all Linux distros, and some that are distro-specific

Who This Book Is For

If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.

Table of Contents

  1. Running Linux in a virtual environment
  2. Securing user accounts
  3. Securing your server with a Firewall
  4. Encrypting and SSH Hardening
  5. Mastering Discretionary Access Control
  6. Access Control Lists and Shared Directory Management
  7. Implementing Mandatory Access Control with SELinux and AppArmor
  8. Scanning, Auditing and Hardening
  9. Vulnerability Scanning and Intrusion Detection
  10. Security Tips & Tricks for the Busy Bee
(HTML tags aren't allowed.)

Pro Python 3: Features and Tools for Professional Development
Pro Python 3: Features and Tools for Professional Development

Refine your programming techniques and approaches to become a more productive and creative Python programmer. This book explores the concepts and features that will improve not only your code but also your understanding of the Python community with insights and details about the Python philosophy.

Pro Python 3,...

Clean Python: Elegant Coding in Python
Clean Python: Elegant Coding in Python
Python is one of the most popular languages today. Relatively new fields such as data science, AI, robotics, and data analytics, along with traditional professions such as web development and scientific research, are embracing Python. It’s increasingly important for programmers writing...
Expert Python Programming: Become a master in Python by learning coding best practices and advanced programming concepts in Python 3.7, 3rd Edition
Expert Python Programming: Become a master in Python by learning coding best practices and advanced programming concepts in Python 3.7, 3rd Edition

Refine your Python programming skills and build professional grade applications with this comprehensive guide

Key Features

  • Create manageable code that can run in various environments with different sets of dependencies
  • Implement effective Python data structures and...

The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
JavaScript Data Structures and Algorithms: An Introduction to Understanding and Implementing Core Data Structure and Algorithm Fundamentals
JavaScript Data Structures and Algorithms: An Introduction to Understanding and Implementing Core Data Structure and Algorithm Fundamentals
The motivation for writing this book was the lack of resources available about data structures and algorithms written in JavaScript. This was strange to me because today many of the job opportunities for software development require knowledge of JavaScript; it is the only language that can be used to write the entire...
Getting Started with Python: Understand key data structures and use Python in object-oriented programming
Getting Started with Python: Understand key data structures and use Python in object-oriented programming

Harness the power of Python objects and data structures to implement algorithms for analyzing your data and efficiently extracting information

Key Features

  • Turn your designs into working software by learning the Python syntax
  • Write robust code with a solid understanding of...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy