Author: Gerhard Mourani
Publisher:
ISBN: 9780968879313
Category : Computer security
Languages : en
Pages : 1208
Book Description
Securing & Optimizing Linux
Author: Gerhard Mourani
Publisher:
ISBN: 9780968879313
Category : Computer security
Languages : en
Pages : 1208
Book Description
Publisher:
ISBN: 9780968879313
Category : Computer security
Languages : en
Pages : 1208
Book Description
Securing and Optimizing LINUX
Author: Gerhard Mourani
Publisher:
ISBN: 9780970033000
Category : Linux
Languages : en
Pages : 0
Book Description
Publisher:
ISBN: 9780970033000
Category : Linux
Languages : en
Pages : 0
Book Description
Linux
Author: K. K. Mookhey
Publisher: ISACA
ISBN: 1893209784
Category : Computer security
Languages : en
Pages : 168
Book Description
This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, security professionals and information systems auditors. It provides the following guidance to IT management: * The business and technology drivers for Linux * The vulnerabilities of the Linux operating system * Risk management issues with an action-oriented perspective * Linux security software * How to secure Linux installations to fulfill the control objectives of two well-known standards-COBIT and ISO 17799 * Detailed internal control questionnaires. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.
Publisher: ISACA
ISBN: 1893209784
Category : Computer security
Languages : en
Pages : 168
Book Description
This document, which focuses on the Linux security issues for one of the more popular versions of Linux, Red Hat version 9/Fedora, provides a standard reference for Linux security controls and their audit for security administrators, security professionals and information systems auditors. It provides the following guidance to IT management: * The business and technology drivers for Linux * The vulnerabilities of the Linux operating system * Risk management issues with an action-oriented perspective * Linux security software * How to secure Linux installations to fulfill the control objectives of two well-known standards-COBIT and ISO 17799 * Detailed internal control questionnaires. Call +1.847.253.1545 ext. 401, visit www.isaca.org/bookstore or e-mail [email protected] for more information.
Securing & Optimizing Linux
Author: Gerhard Mourani
Publisher:
ISBN: 9780968879306
Category : Computer security
Languages : en
Pages : 856
Book Description
Publisher:
ISBN: 9780968879306
Category : Computer security
Languages : en
Pages : 856
Book Description
Practical UNIX and Internet Security
Author: Simson Garfinkel
Publisher: "O'Reilly Media, Inc."
ISBN: 1449310125
Category : Computers
Languages : en
Pages : 989
Book Description
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
Publisher: "O'Reilly Media, Inc."
ISBN: 1449310125
Category : Computers
Languages : en
Pages : 989
Book Description
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.
Linux Networking Clearly Explained
Author: Bryan Pfaffenberger
Publisher: Morgan Kaufmann
ISBN: 9780125331715
Category : Computers
Languages : en
Pages : 404
Book Description
Passionately democratic in its advocacy of networking for the masses, this is the first book on Linux networking written especially for the novice user. Because the free, open-source Linux operating system is winning so many converts today, the number of Linux-based networks will grow exponentially over the next few years. Taking up where Linux Clearly Explained left off, Linux Networking Clearly Explained walks the reader through the creation of a TCP/IP-based, Linux-driven local area network, beginning with a "sandbox" installation involving just two or three computers. Readers master the fundamentals of system and network administration-including handling user accounts and setting up security-in this less complex environment. The author then helps them along to the more sophisticated techniques associated with connecting this network to the Internet. * Focuses on the 20% of Linux networking knowledge that satisfies 80% of network needs-including the needs of small businesses, workgroups within enterprises and high-tech homes. * Teaches novices to implement DNS servers, network information services (NIS), network file systems (NFS), and all of the most important TCP/IP services, including email, Web and newsgroup access. * Explains how to set up AppleTalk and Windows NT domain servers for networks that include MacIntosh or Windows systems. * Comes with a CD containing the latest version of Red Hat Linux, as well as additional freeware/shareware Linux tools and network management applications.
Publisher: Morgan Kaufmann
ISBN: 9780125331715
Category : Computers
Languages : en
Pages : 404
Book Description
Passionately democratic in its advocacy of networking for the masses, this is the first book on Linux networking written especially for the novice user. Because the free, open-source Linux operating system is winning so many converts today, the number of Linux-based networks will grow exponentially over the next few years. Taking up where Linux Clearly Explained left off, Linux Networking Clearly Explained walks the reader through the creation of a TCP/IP-based, Linux-driven local area network, beginning with a "sandbox" installation involving just two or three computers. Readers master the fundamentals of system and network administration-including handling user accounts and setting up security-in this less complex environment. The author then helps them along to the more sophisticated techniques associated with connecting this network to the Internet. * Focuses on the 20% of Linux networking knowledge that satisfies 80% of network needs-including the needs of small businesses, workgroups within enterprises and high-tech homes. * Teaches novices to implement DNS servers, network information services (NIS), network file systems (NFS), and all of the most important TCP/IP services, including email, Web and newsgroup access. * Explains how to set up AppleTalk and Windows NT domain servers for networks that include MacIntosh or Windows systems. * Comes with a CD containing the latest version of Red Hat Linux, as well as additional freeware/shareware Linux tools and network management applications.
Installing and Administering Linux
Author: Linda McKinnon
Publisher: John Wiley & Sons
ISBN: 0471453994
Category : Computers
Languages : en
Pages : 546
Book Description
An indispensable working resource for IT professionals moving to Linux-based network systems This new edition of Linda and Al McKinnon's book satisfies a long-standing need among IT professionals for a comprehensive guide to installing and administering Linux-topics usually covered in a more superficial manner as parts of larger Linux references. In addition to providing complete step-by-step installation instructions, this fast-paced guide shows readers how to perform all essential administrative tasks, including creating users and passwords, managing files and directories, and customizing the environment. Readers also learn how to make the most of Linux Shells and utilities, use the vi editor, and much more. Responding to the ongoing needs of IT professionals for current and reliable information on the latest technologies, Wiley Computer Publishing introduces the Gearhead Press titles. These books, written by accomplished trainers in their respective fields, focus on real-world examples and case studies to give readers the best information on leading topics. The Gearhead Press titles are characterized by two imprints: In the Trenches and Point to Point-both series include fast-paced books written by fellow IT professionals who have been there and done that. In the Trenches books introduce technologies, guide readers to proficiency, and serve as practical, hands-on references after the initial tasks are accomplished. The Point to Point titles invite readers to join an IT team at a model company and implement technologies in real-world environments-demonstrating actual problems and solutions.
Publisher: John Wiley & Sons
ISBN: 0471453994
Category : Computers
Languages : en
Pages : 546
Book Description
An indispensable working resource for IT professionals moving to Linux-based network systems This new edition of Linda and Al McKinnon's book satisfies a long-standing need among IT professionals for a comprehensive guide to installing and administering Linux-topics usually covered in a more superficial manner as parts of larger Linux references. In addition to providing complete step-by-step installation instructions, this fast-paced guide shows readers how to perform all essential administrative tasks, including creating users and passwords, managing files and directories, and customizing the environment. Readers also learn how to make the most of Linux Shells and utilities, use the vi editor, and much more. Responding to the ongoing needs of IT professionals for current and reliable information on the latest technologies, Wiley Computer Publishing introduces the Gearhead Press titles. These books, written by accomplished trainers in their respective fields, focus on real-world examples and case studies to give readers the best information on leading topics. The Gearhead Press titles are characterized by two imprints: In the Trenches and Point to Point-both series include fast-paced books written by fellow IT professionals who have been there and done that. In the Trenches books introduce technologies, guide readers to proficiency, and serve as practical, hands-on references after the initial tasks are accomplished. The Point to Point titles invite readers to join an IT team at a model company and implement technologies in real-world environments-demonstrating actual problems and solutions.
Sams Teach Yourself Red Hat Fedora 4 Linux All in One
Author: Aron Hsiao
Publisher: Sams Publishing
ISBN: 0672327074
Category : Electronic books
Languages : en
Pages : 722
Book Description
Join an estimated 85% of the U.S. Linux market in using Red Hat's Linux distributions by learning it from a Fedora authority. "Sams Teach Yourself Red Hat Fedora 4 All in One" is a starter kit that will help you install, configure, and use Red Hat's Fedora 4 distribution and desktop applications. The easy-to-understand, step-by-step instructions will also show you how to: Use the OpenOffice.org productivity suite and other leading applications. Troubleshoot hardware issues and install new components. Set up a small Linux-based network to share files and resources. Also included is a DVD, which will provide you with the complete Fedora Core Linux distribution, OpenOffice.org desktop suite, and the leading applications for e-mail, Web browsing, and graphics. Find out how you can safely and reliably use Linux and Linux-based applications to accomplish your day-to-day work in the office and at home with "Sams Teach Yourself Red Hat Fedora 4 All in One."
Publisher: Sams Publishing
ISBN: 0672327074
Category : Electronic books
Languages : en
Pages : 722
Book Description
Join an estimated 85% of the U.S. Linux market in using Red Hat's Linux distributions by learning it from a Fedora authority. "Sams Teach Yourself Red Hat Fedora 4 All in One" is a starter kit that will help you install, configure, and use Red Hat's Fedora 4 distribution and desktop applications. The easy-to-understand, step-by-step instructions will also show you how to: Use the OpenOffice.org productivity suite and other leading applications. Troubleshoot hardware issues and install new components. Set up a small Linux-based network to share files and resources. Also included is a DVD, which will provide you with the complete Fedora Core Linux distribution, OpenOffice.org desktop suite, and the leading applications for e-mail, Web browsing, and graphics. Find out how you can safely and reliably use Linux and Linux-based applications to accomplish your day-to-day work in the office and at home with "Sams Teach Yourself Red Hat Fedora 4 All in One."
Advanced Linux Networking
Author: Roderick W. Smith
Publisher: Addison-Wesley Professional
ISBN:
Category : Computers
Languages : en
Pages : 792
Book Description
"Advanced Linux Networking" is designed to help users achieve a higher level of competence. It focuses on powerful techniques and features of Linux networking and provides the know-how needed to improve server efficiency, enhance security, and adapt to new requirements.
Publisher: Addison-Wesley Professional
ISBN:
Category : Computers
Languages : en
Pages : 792
Book Description
"Advanced Linux Networking" is designed to help users achieve a higher level of competence. It focuses on powerful techniques and features of Linux networking and provides the know-how needed to improve server efficiency, enhance security, and adapt to new requirements.
Network Performance and Security
Author: Chris Chapman
Publisher: Syngress
ISBN: 012803601X
Category : Computers
Languages : en
Pages : 382
Book Description
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices. - Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested - Focuses on practical, real world implementation and testing - Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing - Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration - Provides analysis in addition to step by step methodologies
Publisher: Syngress
ISBN: 012803601X
Category : Computers
Languages : en
Pages : 382
Book Description
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices. - Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested - Focuses on practical, real world implementation and testing - Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing - Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration - Provides analysis in addition to step by step methodologies