Practical Linux Security Cookbook : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition.
Linux is often treated as a highly secure operating system. However, the reality is that Linux too has its own share of security flaws. These flaws allow attackers to get into your system and modify or even destroy your important data. This book will work as a practical guide for administrators and...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Birmingham :
Packt Publishing Ltd,
2018.
|
Edition: | 2nd ed. |
Subjects: | |
ISBN: | 9781789136005 1789136008 9781789138399 |
Physical Description: | 1 online resource (475 pages) |
LEADER | 05294cam a2200445Mi 4500 | ||
---|---|---|---|
001 | kn-on1053832665 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 180922s2018 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d YDX |d MERUC |d IDB |d CHVBK |d OCLCO |d LVT |d OCLCF |d N$T |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9781789136005 | ||
020 | |a 1789136008 | ||
020 | |z 9781789138399 | ||
035 | |a (OCoLC)1053832665 |z (OCoLC)1051075113 |z (OCoLC)1089804671 |z (OCoLC)1099949724 | ||
100 | 1 | |a Kalsi, Tajinder. | |
245 | 1 | 0 | |a Practical Linux Security Cookbook : |b Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition. |
250 | |a 2nd ed. | ||
260 | |a Birmingham : |b Packt Publishing Ltd, |c 2018. | ||
300 | |a 1 online resource (475 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Cover; Title Page; Copyright and Credits; Contributors; Packt Upsell; Table of Contents; Preface; Chapter 1: Linux Security Problem; Security policy; Developing a security policy; Linux security myths; Myth -- as Linux is open source, it is considered to be insecure; Myth -- Linux is an experts-only system, and only they know how to configure their systems in terms of security; Myth -- Linux is virus free; Configuring server security; How to do it ... ; User management; Password policy; Configuration policy; Monitoring policy; How it works ... ; Security policy -- server security; How to do it ... | |
505 | 8 | |a General policyConfiguration policy; Monitoring policy; How it works ... ; Defining security controls; How to do it ... ; Installation; Boot and disk; Network and services; Intrusion detection and Denial of Service (DoS); Auditing and availability; How it works ... ; Checking the integrity of installation medium by using checksum; Getting ready; How to do it ... ; How it works ... ; See also; Using LUKS disk encryption; Getting ready; How to do it ... ; There's more ... ; Make use of sudoers -- configuring sudo access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Vulnerability assessment | |
505 | 8 | |a Scanning hosts with NmapGetting ready; How to do it ... ; How it works ... ; See also; Gaining root on a vulnerable Linux system; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Missing backup plans; Getting ready; How to do it ... ; fwbackups; rsync; Amanda (Advanced Maryland Automatic Network Disk Archiver); Simple Backup Solution (SBS); Bacula; How it works ... ; Chapter 2: Configuring a Secure and Optimized Kernel; Creating USB boot media; Getting ready; How to do it ... ; How it works ... ; Retrieving the kernel source; Getting ready; How to do it ... ; How it works ... | |
505 | 8 | |a Configuring and building kernelGetting ready; How to do it ... ; How it works ... ; Installing and booting from a kernel; Getting ready; How to do it ... ; How it works ... ; Kernel testing and debugging; Configuring console for debugging using netconsole; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Debugging kernel boot; How to do it ... ; Kernel errors; Causes of kernel errors; Checking kernel parameters using Lynis; Getting ready; How to do it ... ; Chapter 3: Local Filesystem Security; Viewing files and directory details using ls; Getting ready; How to do it ... ; How it works ... | |
505 | 8 | |a Using chmod to set permissions on files and directoriesGetting ready; How to do it ... ; How it works ... ; There's more ... ; Using chown to change ownership of files and directories; How to do it ... ; There's more ... ; Using ACLs to access files; Getting ready; How to do it ... ; There's more ... ; File handling using the mv command (moving and renaming); Getting ready; How it works ... ; Implementing Mandatory Access Control with SELinux; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using extended file attributes to protect sensitive files; Getting ready; How to do it ... | |
500 | |a Installing and configuring a basic LDAP server on Ubuntu | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Linux is often treated as a highly secure operating system. However, the reality is that Linux too has its own share of security flaws. These flaws allow attackers to get into your system and modify or even destroy your important data. This book will work as a practical guide for administrators and help them configure a more secure machine. | ||
590 | |a Knovel |b Knovel (All titles) | ||
630 | 0 | 0 | |a Linux. |
630 | 0 | 7 | |a Linux |2 fast |
650 | 0 | |a Operating systems |x Security measures. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
776 | 0 | 8 | |i Print version: |a Kalsi, Tajinder. |t Practical Linux Security Cookbook : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition. |d Birmingham : Packt Publishing Ltd, ©2018 |z 9781789138399 |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpPLSCSL01/practical-linux-security?kpromoter=marc |y Full text |