rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780763791896

Security Strategies in Linux Platforms and Applications

by
  • ISBN13:

    9780763791896

  • ISBN10:

    076379189X

  • Format: Paperback
  • Copyright: 2010-09-17
  • Publisher: Jones & Bartlett Learning
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $104.95 Save up to $0.10
  • Buy New
    $104.85
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 24-48 HOURS

Summary

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion on the risks, threats, and vulnerabilities associated with Linux as an operating system using examples from Red Hat Enterprise Linux and Ubuntu. Part 2 discusses how to take advantage of the layers of security available to Linux—user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk students through the fundamentals of security strategies related to the Linux system.

Table of Contents

Part1 Is Linux Really Secure?
Chapter1 Security Threats to Linux
Chapter2 Basic Components of Linux Security
Part2 Layered Security and Linux
Chapter3 Basic Security: Facilities Through the Boot Process
Chapter4 User Privileges and Permissions
Chapter5 Filesystems, Volumes, and Encryption
Chapter6 Every Service Is a Potential Risk
Chapter7 Networks, Firewalls, and More
Chapter8 Networked Filesystems and Remote Access
Chapter9 Networked Application Security
Chapter10 Kernel Security Risk Mitigation
Part3 Building a Layered Linux Security Strategy
Chapter11 Managing Security Alerts and Updates
Chapter12 Building and Maintaining a Security Baseline
Chapter13 Testing and Reporting
Chapter14 Detecting and Responding to Security Breaches
Chapter15 Best Practices and Emerging Technologies

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program