Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustr
Intended for Linux administrators, this guide shows how to protect Linux hosts, the base Linux operating system, and some of the common applications run on Linux hosts. Turnball, who is a security con
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramaticall
If you're an experienced system administrator looking to acquire Linux skills, or a seasoned Linux user facing a new challenge, Linux System Administration offers practical knowledge for managing a co
Write software that makes the most effective use of the Linux system, including the kernel and core system libraries. The majority of both Unix and Linux code is still written at the system level, and
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux syste
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are
The Linux Programming Interface describes the Linux API (application programming interface)-the system calls, library functions, and other low-level interfaces that are used, directly or indirectly, b
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost c
Looks at security issues for Linux users, covering such topics as controlling access to systems, protecting network connections, encrypting files, and detecting intrusions.
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the fou
Linux has become an increasingly popular alternative to the Windows operating system. The reasons for its growing appeal are manifold: Linux is an extremely stable operating system that serves as a pl
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming for both experienced and aspiring security professionals alike. Which tools are most appropriate for c
Read for FREE with Kindle Unlimited!Linux: Beginners guide for learning Linux & Shell scriptingDo you want to learn the Linux Operating System? Do you want to understand how you can use your computer
Linux Server Security?has been written for Sysadmins, DevOps engineers, developers and other technical professionals that wish to improve their hands-on knowledge of securing what is now the most popu
"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of s
"Kali Linux Network Scanning Cookbook" is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but w
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrato
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems
A unique, full-color introduction to Linux fundamentalsServing as a low-cost, secure alternative to expensive operating systems, Linux is a UNIX-based, open source operating system. Full-color and con
Linux deployment continues to increase, and so does the demand for qualified and certified Linux system administrators. If you're seeking a job-based certification from the Linux Professional Institut
You need to maintain clients, servers and networks, while acquiring new skills.Foundations of Cent OS Linux: Enterprise Linux On the Cheap covers a free, unencumbered Linux operating system within the
Are you one of the millions of SysAdmins running a Linux server who can’t find a current book on Linux security? Well….this is the book for you. How to Cheat at Securing Linux Servers is designed to h
Computer System Security: Basic Concepts and Solved Exercises is designed to expose students and others to the basic aspects of computer security. Written by leading experts and instructors, it covers
Linux newbies as well as experienced system administrators who need a command reference will appreciate this guide to Linux commands. Working examples for maintaining any Linux server are included. Ad
The Debian GNU/Linux operating system approaches Linux system administration differently than other popular Linux distributions, favoring text-based configuration mechanisms over graphical user inter
This book/CD-ROM text tours the Linux user interface to provide insight into the inner workings of the system as well as important Linux concepts. Beginning and skilled Linux users will benefit from t
Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users.
The Linux operating system powers millions of web servers, data centers, and application platforms worldwide. Whether you're pushing applications to a cloud system like AWS, building a twitter bot on
The Personnel Security Clearance System—the process by which the federal government incorporates individuals into secret national-security work—is flawed. After?twenty-three?years of federal service,
Windows or Mac OS X users are often daunted by the Linux operating system. And yet learning Linux doesn't have to be hard and the payoff is great. Linux is secure, flexible, and free. I's less suscept
This book studies typical issues regarding China’s financial security, such as internal and external currency security, herd behavior in bank credit, system risk in the stock market, major risks in th
DNS Security: Hacking and Defending the Domain Name System provides tactics on how to secure a Domain Name System (DNS) framework by exploring common DNS vulnerabilities using real-world examples of D
The Ultimate Linux Beginners Guide!Have you ever wanted to learn how to use Linux? This step by step guide will teach youhow to operate the Linux operating system. This book contains everything you ne
Now with a downloadable virtual machine showcasing the book’s test system configuration and updated for the latest Linux kernel release, the new edition of this bestseller teaches system administrator
How Linux Works reveals the inner workings of the Linux system, with in-depth coverage of topics such as device management, the boot sequence, system management basics, and networking. Author Brian Wa
The author of The Zealots Guide To Computer Security 2013, and 17 other books brings you this handy guide to making Linux Mint secure for use in business environments.