|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
|
Ed Mastery
(Hardcover)
Michael W Lucas
|
R888
R756
Discovery Miles 7 560
Save R132 (15%)
|
Ships in 10 - 15 working days
|
|
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
Explore the core functionality of containerizing your applications
and making them production-ready Key Features Grasp basic to
advanced Docker concepts with this comprehensive guide Get
acquainted with Docker containers, Docker images, orchestrators,
cloud integration, and networking Learn to simplify dependencies
and deploy and test containers in production Book
DescriptionContainers enable you to package an application with all
the components it needs, such as libraries and other dependencies,
and ship it as one package. Docker containers have revolutionized
the software supply chain in both small and large enterprises.
Starting with an introduction to Docker fundamentals and setting up
an environment to work with it, you'll delve into concepts such as
Docker containers, Docker images, and Docker Compose. As you
progress, the book will help you explore deployment, orchestration,
networking, and security. Finally, you'll get to grips with Docker
functionalities on public clouds such as Amazon Web Services (AWS),
Azure, and Google Cloud Platform (GCP), and learn about Docker
Enterprise Edition features. Additionally, you'll also discover the
benefits of increased security with the use of containers. By the
end of this Docker book, you'll be able to build, ship, and run a
containerized, highly distributed application on Docker Swarm or
Kubernetes, running on-premises or in the cloud. What you will
learn Containerize your traditional or microservice-based
applications Develop, modify, debug, and test an application
running inside a container Share or ship your application as an
immutable container image Build a Docker Swarm and a Kubernetes
cluster in the cloud Run a highly distributed application using
Docker Swarm or Kubernetes Update or rollback a distributed
application with zero downtime Secure your applications with
encapsulation, networks, and secrets Troubleshoot a containerized,
highly distributed application in the cloud Who this book is
forThis book is for Linux professionals, system administrators,
operations engineers, DevOps engineers, and developers or
stakeholders who are interested in getting started with Docker from
scratch. No prior experience with Docker containers is required.
Users with a Linux system would be able to take full advantage of
this book.
Achieve enterprise automation in your Linux environment with this
comprehensive guide Key Features Automate your Linux infrastructure
with the help of practical use cases and real-world scenarios Learn
to plan, build, manage, and customize OS releases in your
environment Enhance the scalability and efficiency of your
infrastructure with advanced Linux system administration concepts
Book DescriptionAutomation is paramount if you want to run Linux in
your enterprise effectively. It helps you minimize costs by
reducing manual operations, ensuring compliance across data
centers, and accelerating deployments for your cloud
infrastructures. Complete with detailed explanations, practical
examples, and self-assessment questions, this book will teach you
how to manage your Linux estate and leverage Ansible to achieve
effective levels of automation. You'll learn important concepts on
standard operating environments that lend themselves to automation,
and then build on this knowledge by applying Ansible to achieve
standardization throughout your Linux environments. By the end of
this Linux automation book, you'll be able to build, deploy, and
manage an entire estate of Linux servers with higher reliability
and lower overheads than ever before. What you will learn Perform
large-scale automation of Linux environments in an enterprise
Overcome the common challenges and pitfalls of extensive automation
Define the business processes needed to support a large-scale Linux
environment Get well-versed with the most effective and reliable
patch management strategies Automate a range of tasks from simple
user account changes to complex security policy enforcement Learn
best practices and procedures to make your Linux environment
automatable Who this book is forThis book is for anyone who has a
Linux environment to design, implement, and maintain. Open source
professionals including infrastructure architects and system
administrators will find this book useful. You're expected to have
experience in implementing and maintaining Linux servers along with
knowledge of building, patching, and maintaining server
infrastructure. Although not necessary, knowledge of Ansible or
other automation technologies will be beneficial.
|
|