How to Cheat at Securing Linux

How to Cheat at Securing Linux
PDF

Book Description
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system.

This book teaches Linux system administrators how to protect their servers from malicious threats.

As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).

This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.

Content

Chapter 1. Presenting the Business Case for Open Source Software
Chapter 2. Hardening the Operating System
Chapter 3. Enumeration and Scanning Your Network
Chapter 4. Introducing Intrusion Detection and Snort
Chapter 5. Installing and Configuring Snort and Add-Ons
Chapter 6. Advanced Snort Deployment
Chapter 7. Network Analysis, Troubleshooting, and Packet Sniffing
Chapter 8. Basics of Cryptography and Encryption
Chapter 9. Perimeter Security, DMZs, Remote Access, and VPNs
Chapter 10. Linux Bastion Hosts
Chapter 11. Apache Web Server Hardening

Download How to Cheat at Securing Linux PDF or ePUB format free


Free sample

Download in .PDF format



Add comments
Прокомментировать
Введите код с картинки:*
reload, if the code cannot be seen
Copyright © 2019