Cargando…

Mastering Linux security and hardening : a practical guide to protecting your Linux system from cyber attacks /

The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux. In this new edition, you will learn how to set up a practice lab, create user accounts with app...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Tevault, Donald A. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing Ltd., 2023.
Edición:Third edition.
Colección:Expert insight.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1372557641
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 230314s2023 enka o 001 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d EBLCP  |d UKMGB  |d UKAHL  |d OCLCF  |d OCLCQ 
015 |a GBC2M9102  |2 bnb 
016 7 |a 020844965  |2 Uk 
019 |a 1371754010  |a 1372466326 
020 |z 9781837630516 
020 |a 9781837632626 
020 |a 1837632626 
029 1 |a UKMGB  |b 020844965 
029 1 |a AU@  |b 000073529965 
035 |a (OCoLC)1372557641  |z (OCoLC)1371754010  |z (OCoLC)1372466326 
037 |a 9781837630516  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20230314 
049 |a UAMI 
100 1 |a Tevault, Donald A.,  |e author. 
245 1 0 |a Mastering Linux security and hardening :  |b a practical guide to protecting your Linux system from cyber attacks /  |c Donald A. Tevault. 
250 |a Third edition. 
264 1 |a Birmingham, UK :  |b Packt Publishing Ltd.,  |c 2023. 
300 |a 1 online resource (618 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Expert insight 
500 |a Includes index. 
520 |a The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux. In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You'll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you'll get a peek at the new sudo features that have been added over the past couple of years. You'll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you'll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you'll see how to use Security Onion to set up an Intrusion Detection System. By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise. 
505 0 |a Cover -- CopyRight -- Contributors -- Table of Contents -- Preface -- Section I: Setting up a Secure Linux System -- Chapter 1: Running Linux in a Virtual Environment -- Looking at the threat landscape -- Why do security breaches happen? -- Keeping up with security news -- Differences between physical, virtual, and cloud setups -- Introducing VirtualBox and Cygwin -- Installing a virtual machine in VirtualBox -- Installing the EPEL repository on the CentOS 7 virtual machine -- Installing the EPEL repository on the AlmaLinux 8/9 virtual machines 
505 8 |a Configuring a network for VirtualBox virtual machines -- Creating a virtual machine snapshot with VirtualBox -- Using Cygwin to connect to your virtual machines -- Installing Cygwin on your Windows host -- Using the Windows 10 SSH client to interface with Linux virtual machines -- Using the Windows 11 SSH client to interface with Linux virtual machines -- Cygwin versus the Windows shell -- Keeping the Linux systems updated -- Updating Debian-based systems -- Configuring auto updates for Ubuntu -- Updating Red Hat 7-based systems -- Updating Red Hat 8/9-based systems 
505 8 |a Managing updates in an enterprise -- Summary -- Questions -- Further reading -- Answers -- Chapter 2: Securing Administrative User Accounts -- The dangers of logging in as the root user -- The advantages of using sudo -- Setting up sudo privileges for full administrative users -- Adding users to a predefined admin group -- Creating an entry in the sudo policy file -- Setting up sudo for users with only certain delegated privileges -- Hands-on lab for assigning limited sudo privileges -- Advanced tips and tricks for using sudo -- The sudo timer -- View your sudo privileges 
505 8 |a Hands-on lab for disabling the sudo timer -- Preventing users from having root shell access -- Preventing users from using shell escapes -- Preventing users from using other dangerous programs -- Limiting the user's actions with commands -- Letting users run as other users -- Preventing abuse via a user's shell scripts -- Detecting and deleting default user accounts -- New sudo features -- Special sudo considerations for SUSE and OpenSUSE -- Summary -- Questions -- Further reading -- Answers -- Chapter 3: Securing Normal User Accounts -- Locking down users' home directories the Red Hat way 
505 8 |a Locking down users' home directories the Debian/Ubuntu way -- useradd on Debian/Ubuntu -- adduser on Debian/Ubuntu -- Hands-on lab for creating an encrypted home directory with adduser -- Enforcing strong password criteria -- Installing and configuring pwquality -- Hands-on lab for setting password complexity criteria -- Setting and enforcing password and account expiration -- Configuring default expiry data for useradd for Red Hat-type systems only -- Setting expiry data on a per-account basis with useradd and usermod -- Setting expiry data on a per-account basis with chage 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Linux. 
630 0 7 |a Linux.  |2 fast  |0 (OCoLC)fst01382136 
650 0 |a Computer security. 
650 0 |a Computer security  |x Standards. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Operating systems (Computers)  |2 fast  |0 (OCoLC)fst01046280 
776 0 8 |i Print version:  |a Tevault, Donald A.  |t Mastering Linux Security and Hardening  |d Birmingham : Packt Publishing, Limited,c2023 
830 0 |a Expert insight. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781837630516/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30391709 
938 |a Askews and Holts Library Services  |b ASKH  |n AH41024498 
994 |a 92  |b IZTAP