|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1348104852 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
221018s2018 xx 174 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|d OCLCO
|
019 |
|
|
|a 1362792051
|
020 |
|
|
|a 9781492036319
|q (electronic video)
|
020 |
|
|
|a 1492036315
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000072848738
|
035 |
|
|
|a (OCoLC)1348104852
|z (OCoLC)1362792051
|
037 |
|
|
|a 9781492036319
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.774.U28
|
082 |
0 |
4 |
|a 004/.36
|2 23/eng/20221018
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Securing your Ubuntu server.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media, Inc.,
|c [2018]
|
300 |
|
|
|a 1 online resource (1 video file (2 hr., 54 min.)) :
|b sound, color.
|
306 |
|
|
|a 025400
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Jack Wallen, presenter.
|
520 |
|
|
|a What is this video course about, and why is it important? Since its inception, the Linux operating system has enjoyed tremendous popularity and an ever increasing installed base. One of the reasons for its success is because, out of the box, most Linux servers offer a fairly stable and secure environment. Ubuntu, which was released in 2004, has demonstrated itself to be among one of the more secure of the Linux distributions, owing to its built-in enterprise-grade security structure. But today, attackers are becoming ever more sophisticated in their attempts to penetrate your digital assets and steal valuable data, so it's always a good idea to take whatever steps you can to further secure that data residing on your Ubuntu servers. In this video course, host and prolific technology writer Jack Wallen introduces you to some of the basic and necessary steps for hardening an Ubuntu server. You'll see how to set up secure shared memory, use and enforce strong passwords, enable automatic security updates, configure two-factor authentication, and encrypt directories by using ecryptfs. You'll also learn why you should adopt the philosophy of installing only what you need on your Ubuntu server, limiting the applications and daemons running in the background and thus reducing your attack surface. If you're an entry- to intermediate-level system administrator or engineer, by following the steps explained in this tutorial, you can make your Ubuntu server considerably more secure. What you'll learn--and how you can apply it How to enable secure shared memory to prevent an attack against a running service on your Ubuntu Server Enable SSH login for specific users to prevent unauthorized access via secure shell Add a security login banner to serve as a warning to unwanted users Use and enforce strong passwords to prevent users from making use of weak passwords How to encrypt directories with ecryptfs to aid in the protection of your data How to enable automatic security updates, to keep you from missing crucial patches How to install only what you want, so there aren't extraneous daemons and applications running in the background that can be exploited How to enable two-factor authentication for your Ubuntu server to prevent unwanted users from logging in This video course is for you because... You're a security engineer or a system administrator who needs to roll out an Ubuntu-based server and want to make it as secure as possible You're debating whether a Linux server is the right fit for you and your company and want to learn if there are steps you can take to better secure it You're a new administrator or security professional (or a student) and you want to see how easy it is to manage the security of an Ubuntu server Prerequisites: You should have a basic understanding of Linux and general security principles You should know how to use the command line You should have access to a user with root privileges Materials or downloads needed in advance: Learning Path: Networking for Sysadmins Learning Path: Kali Linux.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed October 18, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Ubuntu (Electronic resource)
|
630 |
0 |
7 |
|a Ubuntu (Electronic resource)
|2 fast
|
650 |
|
0 |
|a Client/server computing.
|
650 |
|
0 |
|a Debugging in computer science.
|
650 |
|
6 |
|a Architecture client-serveur (Informatique)
|
650 |
|
6 |
|a Débogage.
|
650 |
|
7 |
|a Client/server computing
|2 fast
|
650 |
|
7 |
|a Debugging in computer science
|2 fast
|
655 |
|
7 |
|a Instructional films
|2 fast
|
655 |
|
7 |
|a Internet videos
|2 fast
|
655 |
|
7 |
|a Nonfiction films
|2 fast
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
655 |
|
7 |
|a Films de formation.
|2 rvmgf
|
655 |
|
7 |
|a Films autres que de fiction.
|2 rvmgf
|
655 |
|
7 |
|a Vidéos sur Internet.
|2 rvmgf
|
700 |
1 |
|
|a Wallen, Jack,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781492036319/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|