ShopSpell

Practical Linux Security Cookbook [Paperback]

$56.99       (Free Shipping)
79 available
  • Category: Books (Computers)
  • Author:  Tajinder Singh Kalsi
  • Author:  Tajinder Singh Kalsi
  • ISBN-10:  1785286420
  • ISBN-10:  1785286420
  • ISBN-13:  9781785286421
  • ISBN-13:  9781785286421
  • Publisher:  Packt Publishing - ebooks Account
  • Publisher:  Packt Publishing - ebooks Account
  • Pages:  322
  • Pages:  322
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-Apr-2016
  • Pub Date:  01-Apr-2016
  • SKU:  1785286420-11-MPOD
  • SKU:  1785286420-11-MPOD
  • Item ID: 100244249
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Dec 30 to Jan 01
  • Notes: Brand New Book. Order Now.

Secure your Linux machines and keep them secured with the help of exciting recipes

About This Book

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasks

Who This Book Is For

Practical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux File systems and administration. You should be familiar with basic Linux commands. Understanding Information security and its risks to a Linux system is also helpful in understanding the recipes more easily.

However, even if you are unfamiliar with Information security, you will be able to easily follow and understand the recipes discussed.

Since Linux Security Cookbook follows a practical approach, following the steps is very easy.

What You Will Learn

  • Learn about various vulnerabilities and exploits in relation to Linux systems
  • Configure and build a secure kernel and test it
  • Learn about file permissions and security and how to securely modify files
  • Explore various ways to authenticate local users while monitoring their activities
  • Authenticate users remotely and securely copy files on remote systems
  • Review various network security methods including firewalls using iptables and TCP Wrapper
  • Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
  • Understand Bash vulnerability/security and patch management

In Detail

With the growing popularity of Linux, more and more administrators have started moving to Linux to create networks or servers for any task. This also makes l#(

Add Review