Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Linux Security Cookbook

Buy

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasks

Book Description

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.

Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.

With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.

With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.

What you will learn

  • Learn about various vulnerabilities and exploits in relation to Linux systems
  • Configure and build a secure kernel and test it
  • Learn about file permissions and security and how to securely modify files
  • Explore various ways to authenticate local users while monitoring their activities.
  • Authenticate users remotely and securely copy files on remote systems
  • Review various network security methods including firewalls using iptables and TCP Wrapper
  • Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
  • Understand Bash vulnerability/security and patch management

About the Author

Tajinder Kalsi is an innovative professional with more than 9 years of progressive experience within the information security industry. He has a good amount of knowledge and experience in web application testing, vulnerability assessment, network penetration testing, and risk assessment.

At present, he is working as an independent information security consultant. He started his career with Wipro as a technical associate, and later on he became an ISMS consultant cum technical evangelist. In his free time, he conducts seminars in colleges all across India on various topics, and he has covered more than 125 colleges and spoken to 10,000+ students.

In the past, he has reviewed books such as Web Application Penetration Testing with Kali Linux, Mastering Kali Linux for Advanced Penetration Testing, and Advanced Wireless Penetration Testing for Highly-Secured Environments.

You can find him on Facebook at www.facebook.com/tajinder.kalsi.tj, or contact him on his website at www.tajinderkalsi.com.

Table of Contents

  1. Linux Security Problems
  2. Configuring a Secure and Optimized Kernel
  3. Local Filesystem Security
  4. Local Authentication in Linux
  5. Remote Authentication
  6. Network Security
  7. Security Tools
  8. Linux Security Distros
  9. Patching a Bash Vulnerability
  10. Security Monitoring and Logging
(HTML tags aren't allowed.)

Troubleshooting Windows Server with PowerShell
Troubleshooting Windows Server with PowerShell

This book shows you how to use PowerShell to quickly pinpoint, diagnose, and solve problems with your Windows Server environment, reducing the need for external tools, and ensuring you stay up-to-date with PowerShell as it quickly becomes one of the most useful tools in an administrator’s toolkit.

Authors Derek Schauland and...

Ubuntu Unleashed 2017 Edition (Includes Content Update Program): Covering 16.10, 17.04, 17.10 (12th Edition)
Ubuntu Unleashed 2017 Edition (Includes Content Update Program): Covering 16.10, 17.04, 17.10 (12th Edition)

Book + Content Update Program

Ubuntu Unleashed 2017 Edition is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly updated by a long-time Ubuntu community leader to reflect the exciting
...

Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...


Spinning Up ServiceNow: IT Service Managers' Guide to Successful User Adoption
Spinning Up ServiceNow: IT Service Managers' Guide to Successful User Adoption
"Once in a while you come across a book you know was written from experience. Spinning Up ServiceNow  is one of those... The first part of the book should be mandatory reading for every ITSM professional regardless of the tool they work with."...
CompTIA Project+ Study Guide: Exam PK0-004
CompTIA Project+ Study Guide: Exam PK0-004

The bestselling Project+ preparation guide, updated for the latest exam

The CompTIA Project+ Study Guide, Second Edition is your comprehensive resource for taking Exam PK0-004. With 100% coverage of all exam objectives, bolstered by real-world scenarios and the Sybex interactive learning environment, this book...

Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy