Author: Gerhard Mourani
Publisher:
ISBN: 9780968879313
Category : Computer security
Languages : en
Pages : 1208
Book Description
Securing & Optimizing Linux
Author: Gerhard Mourani
Publisher:
ISBN: 9780968879313
Category : Computer security
Languages : en
Pages : 1208
Book Description
Publisher:
ISBN: 9780968879313
Category : Computer security
Languages : en
Pages : 1208
Book Description
Linux
Author: K. K. Mookhey
Publisher: ISACA
ISBN: 1893209784
Category : Computer security
Languages : en
Pages : 168
Book Description
This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, security professionals and information systems auditors. It provides the following guidance to IT management: * The business and technology drivers for Linux * The vulnerabilities of the Linux operating system * Risk management issues with an action-oriented perspective * Linux security software * How to secure Linux installations to fulfill the control objectives of two well-known standards-COBIT and ISO 17799 * Detailed internal control questionnaires. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.
Publisher: ISACA
ISBN: 1893209784
Category : Computer security
Languages : en
Pages : 168
Book Description
This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, security professionals and information systems auditors. It provides the following guidance to IT management: * The business and technology drivers for Linux * The vulnerabilities of the Linux operating system * Risk management issues with an action-oriented perspective * Linux security software * How to secure Linux installations to fulfill the control objectives of two well-known standards-COBIT and ISO 17799 * Detailed internal control questionnaires. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.
Red Hat Linux Security and Optimization
Author: Mohammed J. Kabir
Publisher: *Red Hat
ISBN:
Category : Computers
Languages : en
Pages : 724
Book Description
CD-ROM contains: Book chapters in searchable PDF format -- Sample book scripts in text format -- Security tools.
Publisher: *Red Hat
ISBN:
Category : Computers
Languages : en
Pages : 724
Book Description
CD-ROM contains: Book chapters in searchable PDF format -- Sample book scripts in text format -- Security tools.
Securing and Optimizing LINUX
Author: Gerhard Mourani
Publisher:
ISBN: 9780970033000
Category : Linux
Languages : en
Pages : 0
Book Description
Publisher:
ISBN: 9780970033000
Category : Linux
Languages : en
Pages : 0
Book Description
Building Secure Servers with Linux
Author: Michael D. Bauer
Publisher: "O'Reilly Media, Inc."
ISBN: 9780596002176
Category : Computers
Languages : en
Pages : 440
Book Description
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes: Precise directions for securing common services, including the Web, mail, DNS, and file transfer. Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling. Basic installation of intrusion detection tools. Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as key services such as DNS, the Apache Web server, mail, file transfer, and secure shell. With this book in hand, you'll have everything you need to ensure robust security of your Linux system.
Publisher: "O'Reilly Media, Inc."
ISBN: 9780596002176
Category : Computers
Languages : en
Pages : 440
Book Description
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes: Precise directions for securing common services, including the Web, mail, DNS, and file transfer. Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling. Basic installation of intrusion detection tools. Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as key services such as DNS, the Apache Web server, mail, file transfer, and secure shell. With this book in hand, you'll have everything you need to ensure robust security of your Linux system.
Ubuntu Unleashed
Author: Matthew Helmke
Publisher: Pearson Education
ISBN: 0672336936
Category : Computers
Languages : en
Pages : 912
Book Description
"DVD includes the full Ubuntu 13.10 distribution for Intel x86 computers as well as the complete LibreOffice office suite and hundreds of additional programs and utilities"--Page 4 of cover.
Publisher: Pearson Education
ISBN: 0672336936
Category : Computers
Languages : en
Pages : 912
Book Description
"DVD includes the full Ubuntu 13.10 distribution for Intel x86 computers as well as the complete LibreOffice office suite and hundreds of additional programs and utilities"--Page 4 of cover.
Linux Security Cookbook
Author: Daniel J. Barrett
Publisher: "O'Reilly Media, Inc."
ISBN: 1449366767
Category : Computers
Languages : en
Pages : 335
Book Description
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
Publisher: "O'Reilly Media, Inc."
ISBN: 1449366767
Category : Computers
Languages : en
Pages : 335
Book Description
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
Ubuntu Unleashed 2010 Edition
Author: Andrew Hudson
Publisher: Pearson Education
ISBN: 0768696739
Category : Computers
Languages : en
Pages : 1163
Book Description
Ubuntu Unleashed 2010 Edition presents comprehensive coverage of the popular Ubuntu Linux distribution. Windows users, Mac users, and Linux enthusiasts have been increasingly turning to Ubuntu for a user-friendly, easy-to-use Linux distribution. This book provides detailed information on installing, using, and administering Ubuntu. You will learn how to set up a workstation or a server, and you will find complete details on Ubuntu’s easy-to-use desktop and productivity software. Ubuntu Unleashed 2010 Edition includes a range of coverage: From the software you need in your everyday work, such as the OpenOffice.org productivity suite, to how to configure your Linux desktop to run smoothly using multiple printers, shell scripts, and more. For the hardcore Linux enthusiast, there is complete coverage of the X Window system, Linux programming, web server administration, and network administration. Install and configure Ubuntu Get all your system’s devices and peripherals up and running Configure and use the X Window System Manage Linux services and users Run a printer server Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Learn shell scripting Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Create and maintain a MySQL database Configure a firewall Set up an FTP server Use Ubuntu’s development and programming tools Tune your Ubuntu system for maximum performance Learn to manage and compile the kernel and modules
Publisher: Pearson Education
ISBN: 0768696739
Category : Computers
Languages : en
Pages : 1163
Book Description
Ubuntu Unleashed 2010 Edition presents comprehensive coverage of the popular Ubuntu Linux distribution. Windows users, Mac users, and Linux enthusiasts have been increasingly turning to Ubuntu for a user-friendly, easy-to-use Linux distribution. This book provides detailed information on installing, using, and administering Ubuntu. You will learn how to set up a workstation or a server, and you will find complete details on Ubuntu’s easy-to-use desktop and productivity software. Ubuntu Unleashed 2010 Edition includes a range of coverage: From the software you need in your everyday work, such as the OpenOffice.org productivity suite, to how to configure your Linux desktop to run smoothly using multiple printers, shell scripts, and more. For the hardcore Linux enthusiast, there is complete coverage of the X Window system, Linux programming, web server administration, and network administration. Install and configure Ubuntu Get all your system’s devices and peripherals up and running Configure and use the X Window System Manage Linux services and users Run a printer server Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Learn shell scripting Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Create and maintain a MySQL database Configure a firewall Set up an FTP server Use Ubuntu’s development and programming tools Tune your Ubuntu system for maximum performance Learn to manage and compile the kernel and modules
Secure Your Node.js Web Application
Author: Karl Duuna
Publisher: Pragmatic Bookshelf
ISBN: 1680504622
Category : Computers
Languages : en
Pages : 303
Book Description
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer and analyst, and you'll protect your users. Bake security into your code from the start. See how to protect your Node.js applications at every point in the software development life cycle, from setting up the application environment to configuring the database and adding new functionality. You'll follow application security best practices and analyze common coding errors in applications as you work through the real-world scenarios in this book. Protect your database calls from database injection attacks and learn how to securely handle user authentication within your application. Configure your servers securely and build in proper access controls to protect both the web application and all the users using the service. Defend your application from denial of service attacks. Understand how malicious actors target coding flaws and lapses in programming logic to break in to web applications to steal information and disrupt operations. Work through examples illustrating security methods in Node.js. Learn defenses to protect user data flowing in and out of the application. By the end of the book, you'll understand the world of web application security, how to avoid building web applications that attackers consider an easy target, and how to increase your value as a programmer. What You Need: In this book we will be using mainly Node.js. The book covers the basics of JavaScript and Node.js. Since most Web applications have some kind of a database backend, examples in this book work with some of the more popular databases, including MySQL, MongoDB, and Redis.
Publisher: Pragmatic Bookshelf
ISBN: 1680504622
Category : Computers
Languages : en
Pages : 303
Book Description
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer and analyst, and you'll protect your users. Bake security into your code from the start. See how to protect your Node.js applications at every point in the software development life cycle, from setting up the application environment to configuring the database and adding new functionality. You'll follow application security best practices and analyze common coding errors in applications as you work through the real-world scenarios in this book. Protect your database calls from database injection attacks and learn how to securely handle user authentication within your application. Configure your servers securely and build in proper access controls to protect both the web application and all the users using the service. Defend your application from denial of service attacks. Understand how malicious actors target coding flaws and lapses in programming logic to break in to web applications to steal information and disrupt operations. Work through examples illustrating security methods in Node.js. Learn defenses to protect user data flowing in and out of the application. By the end of the book, you'll understand the world of web application security, how to avoid building web applications that attackers consider an easy target, and how to increase your value as a programmer. What You Need: In this book we will be using mainly Node.js. The book covers the basics of JavaScript and Node.js. Since most Web applications have some kind of a database backend, examples in this book work with some of the more popular databases, including MySQL, MongoDB, and Redis.
Linux System Security
Author: Scott Mann
Publisher: Prentice Hall PTR
ISBN:
Category : Computers
Languages : en
Pages : 904
Book Description
One of the first Linux security books to cover Bastille, this workbook contains a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised. Includes a new chapter on network sniffers and port scanners used to detect intruders.
Publisher: Prentice Hall PTR
ISBN:
Category : Computers
Languages : en
Pages : 904
Book Description
One of the first Linux security books to cover Bastille, this workbook contains a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised. Includes a new chapter on network sniffers and port scanners used to detect intruders.