Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
The author presents a guide to mastering the art of preventing Linux systems from getting compromised. Learn how to perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and more. This...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2018.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBSCO_on1021887823 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 180206s2018 enka o 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d EBLCP |d STF |d NLE |d OCLCF |d MERUC |d TOH |d OCLCA |d YDX |d CEF |d KSU |d VT2 |d DEBBG |d TEFOD |d OCLCQ |d OCLCO |d UKMGB |d G3B |d S9I |d C6I |d UAB |d N$T |d UKAHL |d OCLCQ |d OCLCO |d KMS |d QGK |d NLW |d OCLCO |d OCLCQ |d DST |d OCLCO |d OCL |d NZAUC |d OCLCQ |d OCLCO | ||
015 | |a GBB891742 |2 bnb | ||
016 | 7 | |a 018754825 |2 Uk | |
019 | |a 1022213903 |a 1151201804 |a 1241952154 |a 1300597326 |a 1303343724 |a 1303506432 | ||
020 | |a 9781788625067 |q (electronic bk.) | ||
020 | |a 1788625064 |q (electronic bk.) | ||
020 | |a 1788620305 | ||
020 | |a 9781788620307 | ||
020 | |z 9781788620307 | ||
020 | |z 1788620305 | ||
024 | 3 | |a 9781788620307 | |
029 | 1 | |a AU@ |b 000066232284 | |
029 | 1 | |a AU@ |b 000067022161 | |
029 | 1 | |a GBVCP |b 1014940788 | |
029 | 1 | |a UKMGB |b 018754825 | |
029 | 1 | |a AU@ |b 000068859618 | |
035 | |a (OCoLC)1021887823 |z (OCoLC)1022213903 |z (OCoLC)1151201804 |z (OCoLC)1241952154 |z (OCoLC)1300597326 |z (OCoLC)1303343724 |z (OCoLC)1303506432 | ||
037 | |a CL0500000937 |b Safari Books Online | ||
037 | |a F921BBDE-97E1-4C21-B313-183951AFA06E |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 046070 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Tevault, Donald A., |e author. | |
245 | 1 | 0 | |a Mastering Linux security and hardening : |b secure your Linux server and protect it from intruders, malware attacks, and other external threats / |c Donald A. Tevault. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2018. | |
300 | |a 1 online resource : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed March 25, 2019) | |
505 | 0 | |a Running Linux in a virtual environment -- Securing user accounts -- Securing your server with a firewall -- Encrypting and SSH hardening -- Mastering discretionary access control -- Access control lists and shared directory management -- Implementing mandatory access control with SELinux and AppArmor -- Scanning, auditing, and hardening -- Vulnerability scanning and intrusion detection -- Security tips and tricks for the busy bee. | |
520 | |a The author presents a guide to mastering the art of preventing Linux systems from getting compromised. Learn how to perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and more. This book has coverage of techniques that will help prevent attackers from breaching systems, covering topics such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, and protecting user accounts. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
630 | 0 | 0 | |a Linux. |
630 | 0 | 7 | |a Linux |2 fast |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer security |x Standards. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique |x Normes. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Linux. |2 bicssc | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Computer networking & communications. |2 bicssc | |
650 | 7 | |a COMPUTERS |x Operating Systems |x Linux. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |x Standards |2 fast | |
650 | 7 | |a Computer security |2 fast | |
776 | 0 | |z 1788625064 | |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781788620307/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1699218 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH33863023 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL5254594 | ||
938 | |a EBSCOhost |b EBSC |n 1699218 | ||
938 | |a YBP Library Services |b YANK |n 15132145 | ||
994 | |a 92 |b IZTAP |