Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Practical Linux Security Cookbook Book

ISBN: 1785286420

ISBN13: 9781785286421

Practical Linux Security Cookbook

Enhance file system security and learn about network attack, security tools and different versions of Linux build. Key Features Hands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use various security tools and different versions of Linux for different tasks Book Description Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security aws, and these security aws allow attackers to get into your system and modify or even destroy your important data. But there's no need to panic, since there are various mechanisms by which these aws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system. With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux. By the end of this book, you will be able to secure your Linux systems and create a robust environment. What you will learn Learn about vulnerabilities and exploits in relation to Linux systems Configure and build a secure kernel and test it Learn about file permissions and how to securely modify files Authenticate users remotely and securely copy files on remote systems Review different network security methods and tools Perform vulnerability scanning on Linux machines using tools Learn about malware scanning and read through logs Who this book is for This book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily. This description may be from another edition of this product.

Recommended

Format: Paperback

Temporarily Unavailable

We receive fewer than 1 copy every 6 months.

You Might Also Enjoy

Steve Jobs
Steve Jobs
Walter Isaacson

from: $4.05

HTML and CSS: Design and Build Websites
HTML and CSS: Design and Build Websites
Jon Duckett

from: $5.89

Super Deluxe Essential Handbook (Pokémon): The Need-to-Know Stats and Facts on Over 800 Characters
Super Deluxe Essential Handbook (Pokémon): The Need-to-Know Stats and Facts on Over 800 Characters
Scholastic Inc.

from: $6.09

Surveillance Valley: The Secret Military History of the Internet
Surveillance Valley: The Secret Military History of the Internet
Yasha Levine

from: $31.28

JavaScript and jQuery: Interactive Front-End Web Development
JavaScript and jQuery: Interactive Front-End Web Development
Jon Duckett

from: $5.79

Tribal Leadership: Leveraging Natural Groups to Build a Thriving Organization
Tribal Leadership: Leveraging Natural Groups to Build a Thriving Organization
John King, Dave Logan, Halee Fischer-Wright

from: $4.19

The Innovators: How a Group of Inventors, Hackers, Geniuses and Geeks Created the Digital Revolution
The Innovators: How a Group of Inventors, Hackers, Geniuses and Geeks Created the Digital Revolution
Walter Isaacson

from: $5.19

Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
Cathy O'Neil

from: $6.19

The Pleasures of the Damned: Poems, 1951-1993
The Pleasures of the Damned: Poems, 1951-1993
Charles Bukowski

from: $9.29

Windows 10 for Seniors for Dummies
Windows 10 for Seniors for Dummies
Peter Weverka

from: $4.79

Crushing it!
Crushing it!
Gary Vaynerchuk

from: $4.19

iPhone for Seniors for Dummies
iPhone for Seniors for Dummies
Nancy C. Muir

from: $5.19

Automotive Computer Network Repair: Diagnostic Strategies of Modern Automotive Systems
Automotive Computer Network Repair: Diagnostic Strategies of Modern Automotive Systems
Mandy Concepcion

from: $28.74

Vintage Laptop Computers: First Decade: 1980-89
Vintage Laptop Computers: First Decade: 1980-89
James E. Wilson

from: $14.54

iGen: Why Today’s Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us
iGen: Why Today’s Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us
Jean M. Twenge

from: $4.49

Pass SQL Exam 70-461 & Job Interview: Programming SQL Server 2012
Pass SQL Exam 70-461 & Job Interview: Programming SQL Server 2012
Kalman Toth

from: $29.95

A Digital Bundle: Protecting and Promoting Indigenous Knowledge Online
A Digital Bundle: Protecting and Promoting Indigenous Knowledge Online
Jennifer Wemigwans

from: $24.95

Ten Arguments for Deleting Your Social Media Accounts Right Now
Ten Arguments for Deleting Your Social Media Accounts Right Now
Jaron Lanier

from: $5.09

A Comprehensible Guide to Controller Area Network
A Comprehensible Guide to Controller Area Network
Wilfried Voss

from: $16.39

Practical VIM: Edit Text at the Speed of Thought
Practical VIM: Edit Text at the Speed of Thought
Drew Neil

from: $31.99

Customer Reviews

1 customer rating | 1 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured