Oblasti, naše knjige

C++ Visual C++ C#

Apple - MAC OS X

Visual Basic .NET, VBA, V. Studio

Web design

Android

PHP I MYSQL

Python programiranje

Java, JavaScript, JScript, Perl

WordPress

AutoCad, ArchiCAD, SolidWorks, Catia, Pro/Engineer

Mašinsko učenje

Access

Animacija

Audio, Multimedia, Video

Baze podataka

Cloud

CSS

Delphi

Digitalna fotografija

Django

E-komerc

ECDL

GOOGLE

Grafika, Dizajn, Štampa

Hardver

Internet

Joomla

jQuery

Mreže

MS Office

Obrada teksta

OFFICE 2013

Programiranje

Raspberry PI

Rečnici

Robotika

Sertifikati

SQL Server

Statistika

Tabele

Telekomunikacije

Unix, Linux

Windows

Windows 7

Windows 8

Zaštita i sigurnost

 

Oblasti, drugi izdavači

Alternativna učenja

Antropologija

Arheologija

Arhitektura

Astrologija

Astronomija

Audio kursevi + knjige

Autobiografija

Automobili

Bajke

Biografija

Biološke nauke

Botanika

Dečije knjige

Dizajn

Domaće pripovetke

Domaći roman

Drama

E-knjiga

Ekologija

Ekonomija

Elektrotehnika

Enciklopedija

Esejistika

Etika

Fantastika

Film

Filologija

Filozofija

Fizika

Fotografija

Geografija

Geologija

Građevinarstvo

Hemija

Hidrotehnika

Hobi

Horor

Humor

Intervju

Istorija

Istorija i teorija književnosti

Istorija umetnosti

Istorijski roman

Knjiga posle posla - Beletristika i ostala izdanja

Knjižare i naše knjige

Književna kritika

Kuvari, hrana i piće

Leksikografija

Lingvistika

Ljubavni roman

logo

Magija

Marketing

Mašinstvo

Matematika

Medicina

Memoari

Menadžment

Modeliranje podataka

Monografija

Muzika

Nagrađivanje knjige

Naučna fantastika

OpenOffice.org

Operativni sistemi

Oracle

Organizacione nauke

Pedagogija

Pisci u medijima

Ples

Poezija

Politika

Poljoprivreda

Popularna medicina

Popularna nauka

Popularna psihologija

Posao

Pozorište

Pravo

Pravoslavlje

Primenjene nauke

Pripovetke

Prirodne nauke

Priručnik

Psihologija

Publicistika

Putopis

Religija

Roman

Satira

Saveti

Slikarstvo

Socijalna mreža - Facebook

Sociologija

Sport

Sport i hobi

Strip

Tableti

Tehnologija

Triler

Turizam

Twitter

Udžbenici

Umetnost

Urbanizam

UX DIZAJN

 

Zaštita i sigurnost

 

Practical Linux Security Cookbook

 

Practical Linux Security Cookbook

Autor: Tajinder Kalsi
Broj strana: 276
ISBN broj: 9781785286421
Izdavač: PACKT PUBLISHING
Godina izdanja: 2016.

Pregleda (30 dana / ukupno): 31 / 404

Predlog za prevod

  • Twitter
  • Facebook
  • Google plus
  • Linkedin
  • Pinterest
  • Email

 

 

What You Will Learn

  • Learn about various vulnerabilities and exploits in relation to Linux systems
  • Configure and build a secure kernel and test it
  • Learn about file permissions and security and how to securely modify files
  • Explore various ways to authenticate local users while monitoring their activities.
  • Authenticate users remotely and securely copy files on remote systems
  • Review various network security methods including firewalls using iptables and TCP Wrapper
  • Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
  • Understand Bash vulnerability/security and patch management

Book Description

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.

Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.

With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.

With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.

Authors

Tajinder Kalsi

Tajinder Kalsi is an innovative professional with more than 9 years of progressive experience within the information security industry. He has a good amount of knowledge and experience in web application testing, vulnerability assessment, network penetration testing, and risk assessment.

At present, he is working as an independent information security consultant. He started his career with Wipro as a technical associate, and later on he became an ISMS consultant cum technical evangelist. In his free time, he conducts seminars in colleges all across India on various topics, and he has covered more than 125 colleges and spoken to 10,000+ students.

In the past, he has reviewed books such as Web Application Penetration Testing with Kali Linux, Mastering Kali Linux for Advanced Penetration Testing, and Advanced Wireless Penetration Testing for Highly-Secured Environments.

You can find him on Facebook at www.facebook.com/tajinder.kalsi.tj, or contact him on his website at www.tajinderkalsi.com.

Table of Contents

Chapter 1: Linux Security Problems
Chapter 2: Configuring a Secure and Optimized Kernel
Chapter 3: Local Filesystem Security
Chapter 4: Local Authentication in Linux
Chapter 5: Remote Authentication
Chapter 6: Network Security
Chapter 7: Security Tools
Chapter 8: Linux Security Distros
Chapter 9: Patching a Bash Vulnerability
Chapter 10: Security Monitoring and Logging

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

Ostavite komentar, svakoga dana ćemo nekoga nagraditi.

 

Preporučujemo

 

Umetnost obmane

1. Umetnost obmane

Autor pokazuje koliko su i najčuvaniji informacioni sistemi ranjivi pred odlučnim obmanjivačem koji se izdaje za administratora sistema ili za neku drugu, naizgled bezazlenu osobu. Budući da su priče sagledane i iz ugla napadača i iz ugla žrtve, Umetnost obmane istražuje zašto je svaki napad bio tako uspešan i kako se mogao izbeći, lakim i zanimljivim stilom.

Cena 1100 RSD

Više o knjizi Više o knjizi

 

Hacking Android

2. Hacking Android

Explore every nook and cranny of the Android OS to modify your device and guard it against security threats

Predlog za prevod

Više o knjizi Više o knjizi

 

Practical Internet of Things Security

3. Practical Internet of Things Security

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

Predlog za prevod

Više o knjizi Više o knjizi