Monday, September 2, 2019

Maximum Linux Security, (2nd Edition)

File Size: 3.70 Mb

As little as four years ago, Linux books were a rarity on the bookstand. The fledgling operating system was considered a dead-end by some, and a hobby operating system by others. The marketplace for a Linux security book was, as you might guess, remarkably small. Today, Linux growth in the server marketplace easily outpaces commercial operating systems such as Windows NT. Expansion into the consumer arena has also started, with the maturation of the KDE and GNOME environments and the strong support of innovative companies such as Eazel.

No matter how you use Linux, you need to understand its security model. The advent of widespread broadband service has suddenly turned each connected computer into the potential tool of a hacker. Without the proper security provisions, you risk the loss of data, theft of information, perhaps even criminal prosecution for negligence. To make matters worse, Linux distributions are not created equal. Depending on the version of Linux you’re installing, you might be getting a system more secure than traditional desktop operating systems, or a computer more open and exposed than Windows NT on its worst day.

With this revision, Maximum Linux Security continues its tradition of providing the most comprehensive and up-to-date information available. Those new to Linux will enjoy the depth of coverage, and seasoned pros will appreciate the unbiased look at new and upcoming technologies. Linux security is no longer just useful to a select few, and Maximum Linux Security will continue to bring the latest tools and developments to you, the reader.

Part I: Linux Security Basics
1. Introducing Linux Security
2. Physical Security
3. Installation Issues
4. Basic Linux System Administration
Part II: Linux User Security
5. Password Attacks
6. Data Attacks
Part III: Linux Network Security
7. Malicious Code
8. Sniffers and Electronic Eavesdropping
9. Scanners
10. Spoofing
Part IV: Linux Internet Security
11. FTP Security
12. Mail Security
13. Telnet and SSH Security
14. Web Server Security
15. Secure Web Protocols
16. Secure Web Development
17. File Sharing Security
18. Denial-of-Service Attacks
19. Linux and Firewalls
20. Intrusion Detection
21. Logs and Audit Trails
22. Disaster Recovery
Part V: Appendixes
A. Linux Security Command Reference
B. Linux Security Index—Past Linux Security Issues
C. Other Useful Linux Security Utilities/Applications
D. Linux/Unix Security Tools
E. Glossary

Author Details
"John Ray"

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment