- Practical Linux Security Cookbook : Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition
- Practical Linux Security Cookbook — Second Edition
- Book description
- Key Features
- Book Description
- What you will learn
- Who this book is for
- Practical Linux Security Cookbook
- Practical Linux Security Cookbook
Practical Linux Security Cookbook : Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition
Key FeaturesHands-on recipes to create and administer a secure Linux systemEnhance file system security and local and remote user authenticationUse various security tools and different versions of Linux for different tasksBook Description
Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security flaws, and these security flaws allow attackers to get into your system and modify or even destroy your important data. But there’s no need to panic, since there are various mechanisms by which these flaws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system.
With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux.
By the end of this book, you will be able to secure your Linux systems and create a robust environment.
What you will learnLearn about vulnerabilities and exploits in relation to Linux systemsConfigure and build a secure kernel and test itLearn about file permissions and how to securely modify filesAuthenticate users remotely and securely copy files on remote systemsReview different network security methods and toolsPerform vulnerability scanning on Linux machines using toolsLearn about malware scanning and read through logsWho this book is for
This book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily.
Practical Linux Security Cookbook — Second Edition
Read it now on the O’Reilly learning platform with a 10-day free trial.
O’Reilly members get unlimited access to books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.
Book description
Enhance file system security and learn about network attack, security tools and different versions of Linux build.
Key Features
- Hands-on recipes to create and administer a secure Linux system
- Enhance file system security and local and remote user authentication
- Use various security tools and different versions of Linux for different tasks
Book Description
Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security ?aws, and these security ?aws allow attackers to get into your system and modify or even destroy your important data. But there’s no need to panic, since there are various mechanisms by which these ?aws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system.
With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux.
By the end of this book, you will be able to secure your Linux systems and create a robust environment.
What you will learn
- Learn about vulnerabilities and exploits in relation to Linux systems
- Configure and build a secure kernel and test it
- Learn about file permissions and how to securely modify files
- Authenticate users remotely and securely copy files on remote systems
- Review different network security methods and tools
- Perform vulnerability scanning on Linux machines using tools
- Learn about malware scanning and read through logs
Who this book is for
This book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily.
Practical Linux Security Cookbook
About This BookThis book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a networkEnhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasksWho This Book Is For
Practical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux File systems and administration. You should be familiar with basic Linux commands. Understanding Information security and its risks to a Linux system is also helpful in understanding the recipes more easily.
However, even if you are unfamiliar with Information security, you will be able to easily follow and understand the recipes discussed.
Since Linux Security Cookbook follows a practical approach, following the steps is very easy.
What You Will LearnLearn about various vulnerabilities and exploits in relation to Linux systemsConfigure and build a secure kernel and test itLearn about file permissions and security and how to securely modify filesExplore various ways to authenticate local users while monitoring their activities.Authenticate users remotely and securely copy files on remote systemsReview various network security methods including firewalls using iptables and TCP WrapperExplore various security tools including Port Sentry, Squid Proxy, Shorewall, and many moreUnderstand Bash vulnerability/security and patch managementIn Detail
With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.
Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.
With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.
With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.
An easy-to-follow cookbook with step-by-step practical recipes covering the various Linux security administration tasks. Each recipe has screenshots, wherever needed, to make understanding more easy.
Practical Linux Security Cookbook
With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.
Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.
With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.
With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.
- Learn about various vulnerabilities and exploits in relation to Linux systems
- Configure and build a secure kernel and test it
- Learn about file permissions and security and how to securely modify files
- Explore various ways to authenticate local users while monitoring their activities.
- Authenticate users remotely and securely copy files on remote systems
- Review various network security methods including firewalls using iptables and TCP Wrapper
- Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
- Understand Bash vulnerability/security and patch management
You can also get this PDF by using our Android Mobile App directly: