eBooks-it.org Logo
eBooks-IT.org Inner Image

Securing & Optimizing Linux

The Hacking Solution

Securing & Optimizing Linux Image

Book Details:

Publisher:Open Network Architecture
Series: MIX
Author:Gerhard Mourani
Edition:1
ISBN-10:0968879314
ISBN-13:9780968879313
Pages:1208
Published:Jun 26 2002
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:6.23 MB

Book Description:

This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network. The book provides through its 47 chapters, a comprehensive collection of Linux security products and explains in the most simple and structured manner how to safely and easily configure and run many popular Linux-based applications and services, including Exim, Qmail, Apache 2, DHCP, Anti-Virus, Anti-Spam, Anti-Relaying, ProFTPD, and many others. The author of the book relentlessy searches and document new hacking solutions to bring you in this manual the most up-to-date security developments.

Download Link:

Related Books:

Securing and Optimizing Linux

Redhat Edition
Securing and Optimizing Linux Image
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and security configuration, we will use a source distribution (tar.gz) program the most available type for critical server software like Apache, BIND/DNS, Samba, Squid, OpenSSL etc. Source packages give us fast upgrades, security updates when necessary, and a better compilation, customization, and optimization for our specific machines that often we can't have with RPM packages....

Securing Linux

A Survival Guide for Linux Security
Securing Linux Image
As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of Securing Linux, a collaborative effort from many authorities who work with and secure Linux on a daily basis. This new addition to the Security Step-by-Step guides is not just an update to the previous Linux Step-by-Step from SANS. The book is a complete rewrite from the ground up, showing the latest in best practices for securing a Linux system. Check it out: the 104-page definitive guide is not only for security experts. The novice experimenting with Linux at home or in the workplace will benefit from this guide, which covers both workstations and many server setups. By using example scripts and the accompanyi...

Linux Desktop Hacks

Tips & Tools for Customizing and Optimizing your OS
Linux Desktop Hacks Image
The KDE and Gnome desktops have developed into mature operating environments. These technologies not only act as interfaces between the user, the powerful Linux kernel and GNU operating system, but they do so in a fun and intuitive way. Many users are content with the tools and facilities included with these desktops, but--for those who are ready to probe a little deeper--much more functionality can be found by going under the hood.With hacks that any user can follow, Linux Desktop Hacks demonstrates how easy it is to modify Linux to suit your desires. The book is packed with tips on customizing and improving the interface, boosting performance, administering your desktop, and generally making the most out of what X, KDE, Gnome, and the console have ...



2007 - 2021 © eBooks-IT.org