eBooks-it.org Logo
eBooks-IT.org Inner Image

Securing Linux

A Survival Guide for Linux Security

Securing Linux Image

Book Details:

Publisher:SANS Institute
Series: MIX
Author:David Koconis
Edition:1
ISBN-10:097242735X
ISBN-13:9780972427357
Pages:104
Published:Feb 01 2003
Posted:Nov 19 2014
Language:English
Book format:CHM
Book size:0.17 MB

Book Description:

As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of Securing Linux, a collaborative effort from many authorities who work with and secure Linux on a daily basis. This new addition to the Security Step-by-Step guides is not just an update to the previous Linux Step-by-Step from SANS. The book is a complete rewrite from the ground up, showing the latest in best practices for securing a Linux system. Check it out: the 104-page definitive guide is not only for security experts. The novice experimenting with Linux at home or in the workplace will benefit from this guide, which covers both workstations and many server setups. By using example scripts and the accompanying text that explains why a task should be carried out, you can increase the security of your Linux system.

Download Link:

Related Books:

How to Cheat at Securing Linux

How to Cheat at Securing Linux Image
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats.As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact oppo...

Securing & Optimizing Linux

The Hacking Solution
Securing & Optimizing Linux Image
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system administrators, managers, or Linux users who wish to protect their Linux systems from unauthorized intrusions and other external attacks. This new edition contains many tips and useful information related to security and optimization to help you get complete control of what could happen on your Linux server and network. The book provides through its 47 chapters, a comprehensive collection of Linux security produ...

Securing and Optimizing Linux

Redhat Edition
Securing and Optimizing Linux Image
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Red Hat Linux Server with all the necessary security and optimization for a high performance Linux specific machine. Since we speak of optimization and security configuration, we will use a source distribution (tar.gz) program the most available type for critical server software like Apache, BIND/DNS, Samba, Squid, OpenSSL etc. Source packages give us fast upgrades, security updates when necessary, and a better compilation, customization, and optimization for our specific machines that often we can't have with RPM packages....



2007 - 2021 © eBooks-IT.org