Электронный архив

Practical Linux Security Cookbook: Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition.

Показать сокращенную информацию

dc.contributor.author Kalsi Tajinder.
dc.date.accessioned 2024-01-26T21:37:49Z
dc.date.available 2024-01-26T21:37:49Z
dc.date.issued 2018
dc.identifier.citation Kalsi. Practical Linux Security Cookbook: Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition.: 2nd ed. - Birmingham: Packt Publishing Ltd, 2018 - 1 online resource (475 p.) - URL: https://libweb.kpfu.ru/ebsco/pdf/1883902.pdf
dc.identifier.isbn 9781789136005
dc.identifier.isbn 1789136008
dc.identifier.uri https://dspace.kpfu.ru/xmlui/handle/net/178501
dc.description Description based upon print version of record.
dc.description Installing and configuring a basic LDAP server on Ubuntu
dc.description.abstract Linux is often treated as a highly secure operating system. However, the reality is that Linux too has its own share of security flaws. These flaws allow attackers to get into your system and modify or even destroy your important data. This book will work as a practical guide for administrators and help them configure a more secure machine.
dc.description.tableofcontents Cover; Title Page; Copyright and Credits; Contributors; Packt Upsell; Table of Contents; Preface; Chapter 1: Linux Security Problem; Security policy; Developing a security policy; Linux security myths; Myth -- as Linux is open source, it is considered to be insecure; Myth -- Linux is an experts-only system, and only they know how to configure their systems in terms of security; Myth -- Linux is virus free; Configuring server security; How to do it...; User management; Password policy; Configuration policy; Monitoring policy; How it works...; Security policy -- server security; How to do it…
dc.description.tableofcontents General policyConfiguration policy; Monitoring policy; How it works…; Defining security controls; How to do it...; Installation; Boot and disk; Network and services; Intrusion detection and Denial of Service (DoS); Auditing and availability; How it works...; Checking the integrity of installation medium by using checksum; Getting ready; How to do it…; How it works…; See also; Using LUKS disk encryption; Getting ready; How to do it...; There's more...; Make use of sudoers -- configuring sudo access; Getting ready; How to do it…; How it works…; There's more…; Vulnerability assessment
dc.description.tableofcontents Scanning hosts with NmapGetting ready; How to do it...; How it works...; See also; Gaining root on a vulnerable Linux system; Getting ready; How to do it...; How it works...; There's more...; Missing backup plans; Getting ready; How to do it...; fwbackups; rsync; Amanda (Advanced Maryland Automatic Network Disk Archiver); Simple Backup Solution (SBS); Bacula; How it works...; Chapter 2: Configuring a Secure and Optimized Kernel; Creating USB boot media; Getting ready; How to do it...; How it works...; Retrieving the kernel source; Getting ready; How to do it...; How it works...
dc.description.tableofcontents Configuring and building kernelGetting ready; How to do it...; How it works...; Installing and booting from a kernel; Getting ready; How to do it...; How it works...; Kernel testing and debugging; Configuring console for debugging using netconsole; Getting ready; How to do it...; How it works...; There's more...; Debugging kernel boot; How to do it...; Kernel errors; Causes of kernel errors; Checking kernel parameters using Lynis; Getting ready; How to do it...; Chapter 3: Local Filesystem Security; Viewing files and directory details using ls; Getting ready; How to do it…; How it works…
dc.description.tableofcontents Using chmod to set permissions on files and directoriesGetting ready; How to do it...; How it works...; There's more...; Using chown to change ownership of files and directories; How to do it...; There's more...; Using ACLs to access files; Getting ready; How to do it...; There's more...; File handling using the mv command (moving and renaming); Getting ready; How it works...; Implementing Mandatory Access Control with SELinux; Getting ready; How to do it...; How it works...; There's more...; Using extended file attributes to protect sensitive files; Getting ready; How to do it...
dc.language English
dc.language.iso en
dc.publisher Birmingham Packt Publishing Ltd
dc.subject.other Operating systems -- Security measures.
dc.subject.other COMPUTERS / Operating Systems / Linux.
dc.subject.other COMPUTERS / Security / General.
dc.subject.other Electronic books.
dc.subject.other Electronic books.
dc.title Practical Linux Security Cookbook: Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition.
dc.type Book
dc.description.pages 1 online resource (475 p.)
dc.collection Электронно-библиотечные системы
dc.source.id EN05CEBSCO05C1266


Файлы в этом документе

Данный элемент включен в следующие коллекции

Показать сокращенную информацию

Поиск в электронном архиве


Расширенный поиск

Просмотр

Моя учетная запись

Статистика