How to Cheat at Securing Linux

How to Cheat at Securing Linux

Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. Les mer

Vår pris: 460,-
(Paperback)

Fri frakt!
Leveringstid: Usikker levering*
*Vi bestiller varen fra forlag i utlandet. Dersom varen finnes, sender vi den så snart vi får den til lager

Om boka

How to Cheat at Securing Linux

Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats. As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC). This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.

Chapter 1: Introduction to Open Source Security Chapter 2: Hardening the Operating System Chapter 3: System Scanning and Probing Chapter 4: Implementing an Intrusion Detection System Chapter 5: Troubleshooting the Network with Sniffers Chapter 6: Unearthing Rootkits Chapter 7: Defending Against Malware Chapter 8: Defending Databases Chapter 9: Network Authentication and Encryption Chapter 10: Avoiding Sniffing Attacks through Encryption Chapter 11: Creating Virtual Private Networks Chapter 12: Implementing and Maintaining a Firewall

33% of Network Servers run Linux. There has not been a single Linux Security book published since 2005 (when there were 25).

Fakta