[PDF] How to Cheat at Securing Linux by James Stanger | Perlego
Get access to over 650,000 titles
Start your free trial today and explore our endless library.
Start free trial
Join perlego now to get access to over 650,000 books
Join perlego now to get access to over 650,000 books
Join perlego now to get access to over 650,000 books
How to Cheat at Securing Linux
How to Cheat at Securing Linux
Unavailable in your region

How to Cheat at Securing Linux

James Stanger
Start free trial
shareBook
Share book
pages
432 pages
language
English
format
PDF
availableOnMobile
Available on iOS & Android
Unavailable in your region

How to Cheat at Securing Linux

James Stanger
Book details
Table of contents

About This Book

Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats.As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more. The Perfect Reference for the Multitasked SysAdmin
* Discover Why "Measure Twice, Cut Once" Applies to Securing Linux
* Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases
* Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job

Read More

Information

Publisher
Elsevier Science
Year
2011
ISBN
9780080558684
Topic
Computer Science
Subtopic
Cyber Security

Table of contents