Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications

4.11 - 1251 ratings - Source

PART OF THE NEW JONES a BARTLETT LEARNING INFORMATION SYSTEMS SECURITY a ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion on the risks, threats, and vulnerabilities associated with Linux as an operating system using examples from Red Hat Enterprise Linux and Ubuntu. Part 2 discusses how to take advantage of the layers of security available to Linuxa€”user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk students through the fundamentals of security strategies related to the Linux system.a€œGuide to the Secure Configuration of Red Hat Enterprise Linux 5, Revision 3a€ (, October 21, 2009). i731 .pdf (accessed March 2010). Olejniczak, Stephen P., and Brady Kirby. Asterisk for Dummies, Hoboken, NJ: Wiley Publishing, 2007. Open Source TCG Software Stack ... RFC 4340 Internet Assigned Numbers Authority. http://www. port-numbers/ (accessed March 11, 2010). Russell, Rusty. a€œLinux Packetanbsp;...

Title:Security Strategies in Linux Platforms and Applications
Author:Michael Jang
Publisher:Jones & Bartlett Publishers - 2010-10-25


You Must CONTINUE and create a free account to access unlimited downloads & streaming