Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Security (Networking)

Buy
This book provides you with comprehensive knowledge about Linux Security. The book is aimed at readers who are familiar with Linux concepts but now want to gain a solid foundation in Linux security features. It is assumed these readers already understand some Linux and networking concepts, such as network protocols, network servers, and so on. This book contains detailed information to help you fortify your Linux environment and provides questions that enable you to check your understanding at the end of key chapters.

Chapters 1 through 5 cover security basics in the Linux environment. These chapters give you an overview of Linux security, covering the precautions to be taken while installing and administering Linux. This part of the book also gives you an overview of the various authentication and encryption techniques you can use to protect your data.

Chapters 6 through 9 deal with securing networks in the Linux environment. Various kinds of possible network attacks are discussed in this part of the book, and you are given guidelines for preventing these attacks. Securing network servers—such as Apache Web server, FTP server, Sendmail, DNS, and SAMBA—is the core of this second part of the book.

Chapters 10 through 13 focus on preventing intrusion and data recovery. In these chapters, you are provided with an extensive list of signs of intrusions. You will learn to use various tools and security utilities to detect and avoid intrusion.

Maintaining logs regularly is a good practice for system administrators. Logs can give you indications of methods used to attack your system, and at times, you can get information about the attacker as well. Chapter 12, “System Logs,”educates you about using logs. In the last chapter of the book, I discuss the importance of making backups. You’ll realize how important backups are if you ever lose data due to system crashes or other reasons. Various commercial and non-commercial tools that you can use to maintain backups are discussed in this chapter.

Finally, this book also includes several appendices. The appendices include best Linux practices and FAQs for Linux security. An appendix on the future of Linux also is included at the end of the book.
(HTML tags aren't allowed.)

Start Here! Learn Microsoft Visual Basic 2012
Start Here! Learn Microsoft Visual Basic 2012

Ready to learn Microsoft Visual Basic? Start Here!

Learn the fundamentals of modern programming with Visual Basic 2012—and begin building your first Windows 8 apps for the desktop. If you have absolutely no previous experience with Visual Basic, no problem—simply start here! This book introduces must-know...

Sams Teach Yourself Macromedia Dreamweaver 8 in 24 Hours
Sams Teach Yourself Macromedia Dreamweaver 8 in 24 Hours

Learn how to fully exploit the power of Macromedia Dreamweaver 8 with Sams Teach Yourself Macromedia Dreamweaver 8 in 24 Hours. Divided into 24 one-hour lessons, you will learn how to create webpages and how to use the latest and greatest toolset in this updated version of Macromedia...

Software Development Failures
Software Development Failures
Failed or abandoned software development projects cost the U.S. economy alone billions of dollars a year. In Software Development Failures, Kweku Ewusi-Mensah offers an empirically grounded study that suggests why these failures happen and how they can be avoided. Case studies analyzed include the well-known Confirm travel industry...

Distributed Network Data
Distributed Network Data

Build your own distributed sensor network to collect, analyze, and visualize real-time data about our human environment—including noise level, temperature, and people flow. With this hands-on book, you’ll learn how to turn your project idea into working hardware, using the easy-to-learn Arduino microcontroller and...

Quick Course in Microsoft Office Xp: Fast-Track Training Books for Busy People
Quick Course in Microsoft Office Xp: Fast-Track Training Books for Busy People
This guide provides clear, concise instruction and hands-on practice so you get the most out of Office XP. Learn the basics of Outlook, Access, Word, Excel, and PowerPoint, Publisher, FrontPage, Project, and Visio, then gain proficiency.

Quick Course in Microsoft Office XP provides clear, concise instruction and hands-on practice...

Web 2.0: A Strategy Guide: Business thinking and strategies behind successful Web 2.0 implementations
Web 2.0: A Strategy Guide: Business thinking and strategies behind successful Web 2.0 implementations
Web 2.0 makes headlines, but how does it make money? This concise guide explains what's different about Web 2.0 and how those differences can improve your company's bottom line. Whether you're an executive plotting the next move, a small business owner looking to expand, or an entrepreneur planning a startup, Web 2.0: A Strategy Guide illustrates...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy