Source code for ‘Hardening Linux’ by James Turnbull – Apress/hardening-linux. 1 Nov Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of. Sat, 13 Oct GMT hardening linux james turnbull pdf – James. Turnbull is the author of five technical books about open source software and a.
|Published (Last):||1 October 2010|
|PDF File Size:||18.26 Mb|
|ePub File Size:||19.16 Mb|
|Price:||Free* [*Free Regsitration Required]|
Want to Read Currently Reading Read.
John Cross rated it it was amazing May 03, After the rather intense first chapter, the rest of the book’s chapters each focus on a certain aspect of a system or a specific product, showing how to secure your system from that particular perspective.
Books by James Turnbull.
Learn more about Amazon Prime. Previous page of related Sponsored Products. These items are shipped from and sold by different sellers.
Top Reviews Most recent Top Reviews. Tony rated it liked it Apr 06, Alex rated it really liked it Dec 03, I then thought I would never be able to make it as a security auditor since that is what I am on now. To learn more about Amazon Sponsored Products, click here. I haven’t run a Linux box since The knowledge I acquired from the first chapters were enough for me to give this book five stars and the more I read the better I enjoy it. I bought few book but most of them were theoretical and were maybe written for hight level security professionals.
Sponsored Products are advertisements for products sold by merchants on Amazon.
Secure your Linux server and protect it from intruders, malware attacks, and other external threats. Nate rated it liked it Feb 14, Rather spontaneously, I decided to start with this security-focused title instead of the perhaps more intuitive path of installing the latest distro, setting up a bunch of daemons, installing databases, etc.
The section on firewalling is excellent and strikes a solid balance between a technical presentation and a user level presentation. Thanks to chapter 4, I know twice as much about what’s possible and what to look out for with regards ,inux file permissions and ownership, and all those mysterious “special” characters that don’t have to do with the basic read-write-execute stuff.
Amazon Restaurants Food delivery from local restaurants. For example, Turnbull presents the most intuitive tutorial on configuring the iptables firewall I’ve seen so far.
Learning Linux Binary Analysis. The author examines several security testing tools to scan your system for root kits and weak passwords as well as using packet sniffers, the Snort intrusion detection system, and other turnblul.
To see what your friends thought of this book, please sign up. There was a problem filtering reviews right now. Sponsored products related to this item What’s this? Linux Device Drivers Development: Amazon Advertising Find, attract, and engage customers. Christian rated hardeninh really liked it Jul 15, Even though we’re talking about a book of which purpose is to help kinux to secure your Linux server, I felt like I learned more about Linux reading this book than I’ve learned during the last year at work.
Other important areas include securing connections, secure remote administration, public-key encryption, securing files and file systems, mounting drives securely, securing removable drives, encrypting the file system, and file integrity using tripwire.
Of course no book on hardening a system would be complete without discussing how to build an effective firewall. Add all three to Cart Add all three to List. Read reviews that mention hardening linux file system files and file systems book covers linux security chapter secure securing chapters important tools topics administration basics email bind ftp authentication connections covered.
From the Publisher “Hardening” is the process of protecting a system and its applications against unknown threats. Would you like to tell us about a lower price? Get to Know Us. That proved to be an excellent decision.
The techniques described can keep the valuable information out of reach from all but the most determined and skilled cyber-crooks. Thanks for telling us about the problem. Want to Read saving…. Of course setting all of that security up helps a lot but you still need to test the system to see that it works the way you want it to. Nick rated it liked it Oct 19, Mastering Metasploit – Second Edition.
Amazon Renewed Refurbished products with a warranty.
If you are a seller for this product, would you like to suggest updates through seller support? This is the sort of book that covers the topics of interest to those who administer Linux systems that do have valuable information on them.
Needed this text for school, it actually turned out to be pretty good and I would recommend for others learning about the topic. I have been using Linux as a sysadmin for years now and then I started being interested in security. Alex Le rated it it was amazing Jan 18, Couldn’t ask for more. Related Video Shorts 0 Upload your video. Goodreads helps you keep track of books you want to read. Linux Security Cookbook by Daniel J.