Veze, linkovi
Kompjuter biblioteka
Korpa
Mastering Linux Security and Hardening

Zaštita i sigurnost Zaštita i sigurnost

Mastering Linux Security and Hardening

Autor: Donald A. Tevault
Broj strana: 376
ISBN broj: 9781788620307
Izdavač: PACKT PUBLISHING PACKT PUBLISHING
Godina izdanja: 2018.

Pregleda (30 dana / ukupno): 21 / 1086

                 
Twitter   Facebook   Linkedin   Pinterest   Email
                 
Predlog za prevod

 

What You Will Learn

  • Use various techniques to prevent intruders from accessing sensitive data
  • Prevent intruders from planting malware, and detect whether malware has been planted
  • Prevent insiders from accessing data that they aren’t authorized to access
  • Do quick checks to see whether a computer is running network services that it doesn’t need to run
  • Learn security techniques that are common to all Linux distros, and some that are distro-specific

Book Description

This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.

By the end of this book, you will be confident in delivering a system that will be much harder to compromise.

Authors

Donald A. Tevault

Donald A. Tevault—but you can call him Donnie—got involved with Linux way back in 2006, and has been working with it ever since. He holds the Linux Professional Institute Level 3—Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes literally the world over from the comfort of his living room.

Table of Contents

Chapter 1: Running Linux in a Virtual Environment
Chapter 2: Securing User Accounts
Chapter 3: Securing Your Server with a Firewall
Chapter 4: Encrypting and SSH Hardening
Chapter 5: Mastering Discretionary Access Control
Chapter 6: Access Control Lists and Shared Directory Management
Chapter 7: Implementing Mandatory Access Control with SELinux and AppArmor
Chapter 8: Scanning, Auditing, and Hardening
Chapter 9: Vulnerability Scanning and Intrusion Detection
Chapter 10: Security Tips and Tricks for the Busy Bee

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

 

Preporučujemo

Hakerske tajne za neupućene

Hakerske tajne za neupućene

Umetnost obmane

Umetnost obmane

Veze, linkovi
Linkedin Twitter Facebook
 
     
 
© Sva prava pridržana, Kompjuter biblioteka, Beograd, Obalskih radnika 4a, Telefon: +381 11 252 0 272