Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linux Security (Networking)

Buy
This book provides you with comprehensive knowledge about Linux Security. The book is aimed at readers who are familiar with Linux concepts but now want to gain a solid foundation in Linux security features. It is assumed these readers already understand some Linux and networking concepts, such as network protocols, network servers, and so on. This book contains detailed information to help you fortify your Linux environment and provides questions that enable you to check your understanding at the end of key chapters.

Chapters 1 through 5 cover security basics in the Linux environment. These chapters give you an overview of Linux security, covering the precautions to be taken while installing and administering Linux. This part of the book also gives you an overview of the various authentication and encryption techniques you can use to protect your data.

Chapters 6 through 9 deal with securing networks in the Linux environment. Various kinds of possible network attacks are discussed in this part of the book, and you are given guidelines for preventing these attacks. Securing network servers—such as Apache Web server, FTP server, Sendmail, DNS, and SAMBA—is the core of this second part of the book.

Chapters 10 through 13 focus on preventing intrusion and data recovery. In these chapters, you are provided with an extensive list of signs of intrusions. You will learn to use various tools and security utilities to detect and avoid intrusion.

Maintaining logs regularly is a good practice for system administrators. Logs can give you indications of methods used to attack your system, and at times, you can get information about the attacker as well. Chapter 12, “System Logs,”educates you about using logs. In the last chapter of the book, I discuss the importance of making backups. You’ll realize how important backups are if you ever lose data due to system crashes or other reasons. Various commercial and non-commercial tools that you can use to maintain backups are discussed in this chapter.

Finally, this book also includes several appendices. The appendices include best Linux practices and FAQs for Linux security. An appendix on the future of Linux also is included at the end of the book.
(HTML tags aren't allowed.)

Best Practices for Graphic Designers, Color Works: Right Ways of Applying Color in Branding, Wayfinding, Information Design, Digital Environments and Pretty Much Everywhere Else
Best Practices for Graphic Designers, Color Works: Right Ways of Applying Color in Branding, Wayfinding, Information Design, Digital Environments and Pretty Much Everywhere Else

This is the go-to guide for designers as it outlines and details the essential color design skills needed to create successful, meaningful, and aesthetically compelling designs. Along with hands-on projects, it offers unique insights into strategy and business when working in the real world with real clients. Color...

Mastering Linux
Mastering Linux

Encouraging hands-on practice, Mastering Linux provides a comprehensive, up-to-date guide to Linux concepts, usage, and programming. Through a set of carefully selected topics and practical examples, the book imparts a sound understanding of operating system concepts and shows how to use Linux effectively.

...

Scaling Lean & Agile Development: Thinking and Organizational Tools for Large-Scale Scrum
Scaling Lean & Agile Development: Thinking and Organizational Tools for Large-Scale Scrum

Lean Development and Agile Methods for Large-Scale Products: Key Thinking and Organizational Tools for Sustainable Competitive Success

 

Increasingly, large product-development organizations are turning to lean thinking, agile principles and...


Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop
Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop
These are the proceedings of the 7th Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005) held in Edinburgh, Scotland from August 29 to September 1, 2005. The CHES workshop has been sponsored by the International Association for Cryptologic Research (IACR) for the last two years.

We received a total of 108 paper
...
Network Administrators Survival Guide
Network Administrators Survival Guide

The all-in-one practical guide to supporting Cisco networks using freeware tools

  • Save time and money from the author's extensive field experience as a network administrator

  • Gain detailed tips for using freeware and open-source tools,...

C# 2005 For Dummies (Computer/Tech)
C# 2005 For Dummies (Computer/Tech)
Programming can be fun using the power of C#

See how you can use C# to write Windows applications and much more!

Interested in the exciting possibilities of programming with C#? Well, look sharp! Even if you've never programmed before, you'll see how C# allows you to write code using the Visual Studio® 2005 interface. From...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy