๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Securing Linux: A Survival Guide for Linux Security

โœ Scribed by David Koconis, Jim Murray, Jos Purvis, Darrin Wassom


Book ID
127403108
Publisher
SANS Institute
Year
2003
Tongue
English
Weight
177 KB
Category
Library
ISBN-13
9780972427357

No coin nor oath required. For personal study only.

โœฆ Synopsis


Increase the security of your Linux system with this handy, definitive guide. It presents the latest and best practices for securing a Linux system on both workstations and many server setups.


๐Ÿ“œ SIMILAR VOLUMES


Linux Security Cookbook
โœ Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› O'Reilly Media ๐ŸŒ English โš– 657 KB

The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and muc

Linux Server Security
โœ Michael Bauer D. ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐Ÿ› O'Reilly Media ๐ŸŒ English โš– 2 MB

Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of ti

Hacking Linux exposed: Linux security se
โœ Brian Hatch ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Osborne/McGraw-Hill ๐ŸŒ English โš– 8 MB

If you have a vulnerable computer attached to the BIG BAD INTERNET, sooner or later your box will be compromised. Notice I prefer the term compromised to hacked. Hacking is a benign activity. You hack out of curiosity and [hopefully] with prior permission. Can this be done? Can I get into this box?