PART OF THE NEW JONES a BARTLETT LEARNING INFORMATION SYSTEMS SECURITY a ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion on the risks, threats, and vulnerabilities associated with Linux as an operating system using examples from Red Hat Enterprise Linux and Ubuntu. Part 2 discusses how to take advantage of the layers of security available to Linuxauser and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk students through the fundamentals of security strategies related to the Linux system.aGuide to the Secure Configuration of Red Hat Enterprise Linux 5, Revision 3a ( NSA.gov, October 21, 2009). http://www.nsa.gov/ia/_files/os/redhat/rhel5-guide- i731 .pdf (accessed March 2010). Olejniczak, Stephen P., and Brady Kirby. Asterisk for Dummies, Hoboken, NJ: Wiley Publishing, 2007. Open Source TCG Software Stack ... RFC 4340 Internet Assigned Numbers Authority. http://www. iana.org/assignments/ port-numbers/ (accessed March 11, 2010). Russell, Rusty. aLinux Packetanbsp;...
|Title||:||Security Strategies in Linux Platforms and Applications|
|Publisher||:||Jones & Bartlett Publishers - 2010-10-25|