Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

Buy

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more
  • Master the art of securing a Linux environment with this end-to-end practical guide

Book Description

This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.

By the end of this book, you will be confident in delivering a system that will be much harder to compromise.

What you will learn

  • Use various techniques to prevent intruders from accessing sensitive data
  • Prevent intruders from planting malware, and detect whether malware has been planted
  • Prevent insiders from accessing data that they aren't authorized to access
  • Do quick checks to see whether a computer is running network services that it doesn't need to run
  • Learn security techniques that are common to all Linux distros, and some that are distro-specific

Who This Book Is For

If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.

Table of Contents

  1. Running Linux in a virtual environment
  2. Securing user accounts
  3. Securing your server with a Firewall
  4. Encrypting and SSH Hardening
  5. Mastering Discretionary Access Control
  6. Access Control Lists and Shared Directory Management
  7. Implementing Mandatory Access Control with SELinux and AppArmor
  8. Scanning, Auditing and Hardening
  9. Vulnerability Scanning and Intrusion Detection
  10. Security Tips & Tricks for the Busy Bee
(HTML tags aren't allowed.)

Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition
Machine Learning Algorithms: Popular algorithms for data science and machine learning, 2nd Edition

An easy-to-follow, step-by-step guide for getting to grips with the real-world application of machine learning algorithms

Key Features

  • Explore statistics and complex mathematics for data-intensive applications
  • Discover new developments in EM algorithm, PCA, and bayesian...
Linux Administration Cookbook: Insightful recipes to work with system administration tasks on Linux
Linux Administration Cookbook: Insightful recipes to work with system administration tasks on Linux

Over 100 recipes to get up and running with the modern Linux administration ecosystem

Key Features

  • Understand and implement the core system administration tasks in Linux
  • Discover tools and techniques to troubleshoot your Linux system
  • Maintain a healthy...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...

Learn to Program with Python 3: A Step-by-Step Guide to Programming
Learn to Program with Python 3: A Step-by-Step Guide to Programming

Move from zero knowledge of programming to comfortably writing small to medium-sized programs in Python. Fully updated for Python 3, with code and examples throughout, the book explains Python coding with an accessible, step-by-step approach designed to bring you comfortably into the world of software development.

...
Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program
Bad Programming Practices 101: Become a Better Coder by Learning How (Not) to Program
This book takes a humorous slant on the programming practice manual by reversing the usual approach: under the pretence of teaching you how to become the world’s worst programmer who generally causes chaos, the book teaches you how to avoid the kind of bad habits that introduce bugs or cause code contributions to be rejected....
Smarter Homes: How Technology Will Change Your Home Life (Design Thinking)
Smarter Homes: How Technology Will Change Your Home Life (Design Thinking)
Examine the history of smart homes, how technology shapes our lives, and ways you can think about the home when developing new products. This book presents the opportunities in the homespace that will come from understanding the history and multiple players that have contributed to the development of the home in general. ...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy