Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustr
Intended for Linux administrators, this guide shows how to protect Linux hosts, the base Linux operating system, and some of the common applications run on Linux hosts. Turnball, who is a security con
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramaticall
Write software that makes the most effective use of the Linux system, including the kernel and core system libraries. The majority of both Unix and Linux code is still written at the system level, and
If you're an experienced system administrator looking to acquire Linux skills, or a seasoned Linux user facing a new challenge, Linux System Administration offers practical knowledge for managing a co
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux syste
The Linux Programming Interface describes the Linux API (application programming interface)-the system calls, library functions, and other low-level interfaces that are used, directly or indirectly, b
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost c
Looks at security issues for Linux users, covering such topics as controlling access to systems, protecting network connections, encrypting files, and detecting intrusions.
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the fou
Linux has become an increasingly popular alternative to the Windows operating system. The reasons for its growing appeal are manifold: Linux is an extremely stable operating system that serves as a pl
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming for both experienced and aspiring security professionals alike. Which tools are most appropriate for c
Read for FREE with Kindle Unlimited!Linux: Beginners guide for learning Linux & Shell scriptingDo you want to learn the Linux Operating System? Do you want to understand how you can use your computer
Linux Server Security?has been written for Sysadmins, DevOps engineers, developers and other technical professionals that wish to improve their hands-on knowledge of securing what is now the most popu
"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of s
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrato
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems
A unique, full-color introduction to Linux fundamentalsServing as a low-cost, secure alternative to expensive operating systems, Linux is a UNIX-based, open source operating system. Full-color and con
You need to maintain clients, servers and networks, while acquiring new skills.Foundations of Cent OS Linux: Enterprise Linux On the Cheap covers a free, unencumbered Linux operating system within the
Are you one of the millions of SysAdmins running a Linux server who can’t find a current book on Linux security? Well….this is the book for you. How to Cheat at Securing Linux Servers is designed to h
Computer System Security: Basic Concepts and Solved Exercises is designed to expose students and others to the basic aspects of computer security. Written by leading experts and instructors, it covers
Linux newbies as well as experienced system administrators who need a command reference will appreciate this guide to Linux commands. Working examples for maintaining any Linux server are included. Ad
The Debian GNU/Linux operating system approaches Linux system administration differently than other popular Linux distributions, favoring text-based configuration mechanisms over graphical user inter
This book/CD-ROM text tours the Linux user interface to provide insight into the inner workings of the system as well as important Linux concepts. Beginning and skilled Linux users will benefit from t
Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users.
The Linux operating system powers millions of web servers, data centers, and application platforms worldwide. Whether you're pushing applications to a cloud system like AWS, building a twitter bot on
The Personnel Security Clearance System—the process by which the federal government incorporates individuals into secret national-security work—is flawed. After?twenty-three?years of federal service,
Windows or Mac OS X users are often daunted by the Linux operating system. And yet learning Linux doesn't have to be hard and the payoff is great. Linux is secure, flexible, and free. I's less suscept
DNS Security: Hacking and Defending the Domain Name System provides tactics on how to secure a Domain Name System (DNS) framework by exploring common DNS vulnerabilities using real-world examples of D
The Ultimate Linux Beginners Guide!Have you ever wanted to learn how to use Linux? This step by step guide will teach youhow to operate the Linux operating system. This book contains everything you ne
Now with a downloadable virtual machine showcasing the book’s test system configuration and updated for the latest Linux kernel release, the new edition of this bestseller teaches system administrator
"Kali Linux Network Scanning Cookbook" is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but w
How Linux Works reveals the inner workings of the Linux system, with in-depth coverage of topics such as device management, the boot sequence, system management basics, and networking. Author Brian Wa
Many people think of Linux as a computer operating system, running on users' desktops and powering servers. But Linux can also be found inside many consumer electronics devices. Whether they're the
LINUX OPERATIONS AND ADMINISTRATION introduces readers to Linux operations and system administration through a unified installation, using virtual machines. This text is more effective than those that
Covering all major aspects of Linux system management critical to running Oracle on Linux, this guide focuses on those tasks most important to Oracle administrators, such as file management, moving an