Cargando…

Linux security and hardening : the practical security guide /

"This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. By the end of this course, you will be able to tighten up the security on any Linux system. You'll learn the security...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Cannon, Jason (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1062397133
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 181112s2018 xx 256 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d OCLCF  |d TOH  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000067119279 
035 |a (OCoLC)1062397133 
037 |a CL0501000006  |b Safari Books Online 
050 4 |a TK5105.59 
049 |a UAMI 
100 1 |a Cannon, Jason,  |e speaker. 
245 1 0 |a Linux security and hardening :  |b the practical security guide /  |c Jason Cannon. 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (1 streaming video file (4 hr., 15 min., 45 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from resource description page (Safari, viewed November 9, 2018). 
511 0 |a Presenter, Jason Cannon. 
520 |a "This course will not only teach you the security concepts and guidelines that will keep your Linux servers safe, it will walk you through hardening measures step-by-step. By the end of this course, you will be able to tighten up the security on any Linux system. You'll learn the security weaknesses of the Linux operating system and will be given step-by-step instructions on how to protect those weaknesses. You'll even learn some security concepts that apply to information security as a whole while focusing on Linux-specific issues that require special consideration. What you learn in this course applies to any Linux environment or distribution including Ubuntu, Debian, Linux Mint, RedHat, CentOS, Fedora, OpenSUSE, Slackware, Kali Linux, and more."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Linux. 
630 0 7 |a Linux.  |2 fast  |0 (OCoLC)fst01382136 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Operating systems (Computers) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Systèmes d'exploitation (Ordinateurs) 
650 7 |a operating systems.  |2 aat 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Operating systems (Computers)  |2 fast  |0 (OCoLC)fst01046280 
856 4 0 |u https://learning.oreilly.com/videos/~/9781789612820/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP