咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Practical Linux Security Cookb... 收藏

Practical Linux Security Cookbook

实用Linux安全手册

丛 书 名:Quick Answers to Common Problems

版本说明:1

作     者:Kalsi, Tajinder 

I S B N:(纸本) 9781785286421;9781785285301 

出 版 社:Packt Publishing 

出 版 年:2016年

主 题 词:Computer security Operating systems (Computers)--Security measures 

学科分类:08[工学] 0835[工学-软件工程] 081202[工学-计算机软件与理论] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

摘      要:About This BookThis book provides code-intensive discussions with detailed recipes that help you understand better and learn *** than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a networkEnhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasksWho This Book Is ForPractical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux filesystems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more ***, even if you are unfamiliar with information security, you will be able to easily follow and understand the recipes *** Practical Linux Security Cookbook follows a practical approach, following the steps is very *** You Will LearnLearn about various vulnerabilities and exploits in relation to Linux systemsConfigure and build a secure kernel and test itLearn about file permissions and security and how to securely modify filesAuthenticate users remotely and securely copy files on remote systemsReview various network security methods including firewalls using iptables and TCP WrapperExplore various security tools including Port Sentry, Squid Proxy, Shorewall, and many moreIn DetailPractical Linux Security Cookbook will provide you with the necessary skills to make systems more secure whether you are new to Linux administration or *** lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication locally and remotely and mitigating network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for *** sev

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分