Increase the security of your Linux system with this handy, definitive guide. It presents the latest and best practices for securing a Linux system on both workstations and many server setups.
Linux Security
✍ Scribed by Shadab Siddiqui
- Publisher
- Premier Press
- Year
- 2002
- Tongue
- English
- Leaves
- 513
- Series
- Networking
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Книга Linux Security Linux SecurityКниги Linux Автор: Shadab Siddiqui Год издания: 2002 Формат: pdf Издат.:Premier Press Страниц: 488 Размер: 2,6 ISBN: 1-931841-99-3 Язык: Английский0 (голосов: 0) Оценка:Electronic commerce has become a significant part of business. As more companies are moving to the Web, there is a growing need to ensure the security of servers. Viruses and hackers aren’t the only threats; with e-business, the illegitimate use of information also is a major concern. The Linux operation system is widely used for networking and software development. It includes features to identify and control breaches of security, both internal and external. Linux Security gives you the knowledge to maximize the benefits of Linux products, keep your business safe, and gain a competitive edge!
📜 SIMILAR VOLUMES
As the Linux operating system has matured and grown in popularity, security risks have increased. SANS is pleased to announce publication of Securing Linux, a collaborative effort from many authorities who work with and secure Linux on a daily basis. This new addition to the Security Step-by-Step gu
The Mastering Linux Series consisting of 6 books (Fundamentals, System Administration, Servers, Storage, Security, Networking) provides you with a solid foundation about the Linux Operating System. It abstracts from a particular distribution by giving you the background knowledge to easily work with
Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to det