Securing & Optimizing Linux
Book Details:
Publisher: | Open Network Architecture |
Series: |
MIX
|
Author: | Gerhard Mourani |
Edition: | 1 |
ISBN-10: | 0968879314 |
ISBN-13: | 9780968879313 |
Pages: | 1208 |
Published: | Jun 26 2002 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 6.23 MB |
Book Description:
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network. The book provides through its 47 chapters, a comprehensive collection of Linux security products and explains in the most simple and structured manner how to safely and easily configure and run many popular Linux-based applications and services, including Exim, Qmail, Apache 2, DHCP, Anti-Virus, Anti-Spam, Anti-Relaying, ProFTPD, and many others. The author of the book relentlessy searches and document new hacking solutions to bring you in this manual the most up-to-date security developments.
Redhat Edition
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and security configuration, we will use a source distribution (tar.gz) program the most available type for critical server software like Apache, BIND/DNS, Samba, Squid, OpenSSL etc. Source packages give us fast upgrades, security updates when necessary, and a better compilation, customization, and optimization for our specific machines that often we can't have with RPM packages....
A Survival Guide for Linux Security
As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of Securing Linux, a collaborative effort from many authorities who work with and secure Linux on a daily basis. This new addition to the Security Step-by-Step guides is not just an update to the previous Linux Step-by-Step from SANS. The book is a complete rewrite from the ground up, showing the latest in best practices for securing a Linux system. Check it out: the 104-page definitive guide is not only for security experts. The novice experimenting with Linux at home or in the workplace will benefit from this guide, which covers both workstations and many server setups. By using example scripts and the accompanyi...
Tips & Tools for Customizing and Optimizing your OS
The KDE and Gnome desktops have developed into mature operating environments. These technologies not only act as interfaces between the user, the powerful Linux kernel and GNU operating system, but they do so in a fun and intuitive way. Many users are content with the tools and facilities included with these desktops, but--for those who are ready to probe a little deeper--much more functionality can be found by going under the hood.With hacks that any user can follow, Linux Desktop Hacks demonstrates how easy it is to modify Linux to suit your desires. The book is packed with tips on customizing and improving the interface, boosting performance, administering your desktop, and generally making the most out of what X, KDE, Gnome, and the console have ...
2007 - 2021 © eBooks-IT.org