Mastering Linux Security and Hardening

Mastering Linux Security and Hardening یا تسلط بر امنیت و سخت افزاری لینوکس، از انتشارات Packt Publishing، کتابی جامع در خصوص نحوه جلوگیری از نفوذ مهاجمان به سیستم های شما، با ایجاد یک محیط امن لینوکس را آموزش می دهد. همچنین در این کتاب به بررسی تکنیک های مختلف امنیتی، SSH، تشخیص سرویس های شبکه، تنظیم فایروال، رمزگذاری فایل های سیستم، حفاظت از حساب های کاربری، فرآیندهای احراز هویت، و غیره بررسی می شود.در نهایت، در این کتاب به بهترین شیوه ها و تکنیک های عیب یابی بررسی میگردد.

لینک دانلود کتاب Packt Publishing – Mastering Linux Security and Hardening

دانلود – حجم : 9 مگابایت

رمز فایل: technet24.ir

Book Details
ISBN 139781788620307
Donald A. Tevault
January 2018
Paperback 376 pages

Book Description

This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently.

By the end of this book, you will be confident in delivering a system that will be much harder to compromise.

Table of Contents

1: Running Linux in a Virtual Environment
2: Securing User Accounts
3: Securing Your Server with a Firewall
4: Encrypting and SSH Hardening
5: Mastering Discretionary Access Control
6: Access Control Lists and Shared Directory Management
7: Implementing Mandatory Access Control with SELinux and AppArmor
8: Scanning, Auditing, and Hardening
9: Vulnerability Scanning and Intrusion Detection
10: Security Tips and Tricks for the Busy Bee

What You Will Learn

Use various techniques to prevent intruders from accessing sensitive data
Prevent intruders from planting malware, and detect whether malware has been planted
Prevent insiders from accessing data that they aren’t authorized to access
Do quick checks to see whether a computer is running network services that it doesn’t need to run
Learn security techniques that are common to all Linux distros, and some that are distro-specific

90%
Awesome
  • Design

دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.