Security strategies in Linux platforms and applications / Michael Jang and Ric Messier.

By: Jang, Michael HContributor(s): Messier, RicMaterial type: TextTextSeries: Jones & Bartlett Learning information systems security & assurance seriesPublisher: Burlington, MA : Jones & Bartlett Learning, c2017Edition: Second editionDescription: xxiii, 514 pages : illustrations ; 23 cmISBN: 9781284090659 (Pbk.)Subject(s): Linux | Operating systems (Computers) | Computer securityLOC classification: QA76.76.O63 | J36 2017
Contents:
Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
Summary: "The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Call number Copy number Status Notes Date due Barcode
Books Books MMSU Main Library
QA76.76 .O63 J38 2017 CIRC (Browse shelf(Opens below)) 18-0549 Available For Circulation 34900

Includes bibliographical references and index.

Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.

"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"-- Provided by publisher.

There are no comments on this title.

to post a comment.

© 2023 Mariano Marcos State University. All Rights Reserved.

Powered by Koha