With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.
Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.
With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.
With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.
Tajinder Kalsi is an innovative professional with more than 9 years of progressive experience within the information security industry. He has a good amount of knowledge and experience in web application testing, vulnerability assessment, network penetration testing, and risk assessment.
At present, he is working as an independent information security consultant. He started his career with Wipro as a technical associate, and later on he became an ISMS consultant cum technical evangelist. In his free time, he conducts seminars in colleges all across India on various topics, and he has covered more than 125 colleges and spoken to 10,000+ students.
In the past, he has reviewed books such as Web Application Penetration Testing with Kali Linux, Mastering Kali Linux for Advanced Penetration Testing, and Advanced Wireless Penetration Testing for Highly-Secured Environments.
You can find him on Facebook at www.facebook.com/tajinder.kalsi.tj, or contact him on his website at www.tajinderkalsi.com.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Tajinder Kalsi
Tajinder Kalsi is an innovative professional with more than 9 years of progressive experience within the information security industry. He has a good amount of knowledge and experience in web application testing, vulnerability assessment, network penetration testing, and risk assessment. At present, he is working as an independent information security consultant. He started his career with Wipro as a technical associate, and later on he became an ISMS consultant cum technical evangelist. In his free time, he conducts seminars in colleges all across India on various topics, and he has covered more than 125 colleges and spoken to 10,000+ students. In the past, he has reviewed books such as Web Application Penetration Testing with Kali Linux, Mastering Kali Linux for Advanced Penetration Testing, and Advanced Wireless Penetration Testing for Highly-Secured Environments. You can find him on Facebook at www.facebook.com/tajinder.kalsi.tj, or contact him on his website at www.tajinderkalsi.com.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 28,97 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiEUR 1,20 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9781785286421
Quantità: Più di 20 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
PAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Codice articolo L0-9781785286421
Quantità: Più di 20 disponibili
Da: Rarewaves.com UK, London, Regno Unito
Digital. Condizione: New. Secure your Linux machines and keep them secured with the help of exciting recipesAbout This Book. This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster. More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network. Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasksWho This Book Is ForPractical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux File systems and administration. You should be familiar with basic Linux commands. Understanding Information security and its risks to a Linux system is also helpful in understanding the recipes more easily.However, even if you are unfamiliar with Information security, you will be able to easily follow and understand the recipes discussed.Since Linux Security Cookbook follows a practical approach, following the steps is very easy.What You Will Learn. Learn about various vulnerabilities and exploits in relation to Linux systems. Configure and build a secure kernel and test it. Learn about file permissions and security and how to securely modify files. Explore various ways to authenticate local users while monitoring their activities. Authenticate users remotely and securely copy files on remote systems. Review various network security methods including firewalls using iptables and TCP Wrapper. Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more. Understand Bash vulnerability/security and patch managementIn DetailWith the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.Style and approachAn easy-to-follow cookbook with step-by-step practical recipes covering the various Linux security administration tasks. Each recipe has screenshots, wherever needed, to make understanding more ea. Codice articolo LU-9781785286421
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781785286421_new
Quantità: Più di 20 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526. Codice articolo C9781785286421
Quantità: Più di 20 disponibili
Da: moluna, Greven, Germania
Condizione: New. Codice articolo 448320489
Quantità: Più di 20 disponibili
Da: Rarewaves.com USA, London, LONDO, Regno Unito
Digital. Condizione: New. Secure your Linux machines and keep them secured with the help of exciting recipesAbout This Book. This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster. More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network. Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasksWho This Book Is ForPractical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux File systems and administration. You should be familiar with basic Linux commands. Understanding Information security and its risks to a Linux system is also helpful in understanding the recipes more easily.However, even if you are unfamiliar with Information security, you will be able to easily follow and understand the recipes discussed.Since Linux Security Cookbook follows a practical approach, following the steps is very easy.What You Will Learn. Learn about various vulnerabilities and exploits in relation to Linux systems. Configure and build a secure kernel and test it. Learn about file permissions and security and how to securely modify files. Explore various ways to authenticate local users while monitoring their activities. Authenticate users remotely and securely copy files on remote systems. Review various network security methods including firewalls using iptables and TCP Wrapper. Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more. Understand Bash vulnerability/security and patch managementIn DetailWith the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.Style and approachAn easy-to-follow cookbook with step-by-step practical recipes covering the various Linux security administration tasks. Each recipe has screenshots, wherever needed, to make understanding more ea. Codice articolo LU-9781785286421
Quantità: Più di 20 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering. Codice articolo 9781785286421
Quantità: 1 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Mar2912160169024
Quantità: Più di 20 disponibili
Da: dsmbooks, Liverpool, Regno Unito
Paperback. Condizione: Like New. Like New. book. Codice articolo D7F7-3-M-1785286420-6
Quantità: 1 disponibili