|
|
Showing 1 - 4 of
4 matches in All Departments
Gain a firm practical understanding of how to secure your Linux
system from intruders, malware attacks, and other cyber threats Key
Features * Discover security techniques to prevent malware from
infecting a Linux system, and detect it * Prevent unauthorized
people from breaking into a Linux system * Protect important and
sensitive data from being revealed to unauthorized persons Book
Description The third edition of Mastering Linux Security and
Hardening is an updated, comprehensive introduction to implementing
the latest Linux security measures, using the latest versions of
Ubuntu and AlmaLinux. In this new edition, you will learn how to
set up a practice lab, create user accounts with appropriate
privilege levels, protect sensitive data with permissions settings
and encryption, and configure a firewall with the newest firewall
technologies. You'll also explore how to use sudo to set up
administrative accounts with only the privileges required to do a
specific job, and you'll get a peek at the new sudo features that
have been added over the past couple of years. You'll also see
updated information on how to set up a local certificate authority
for both Ubuntu and AlmaLinux, as well as how to automate system
auditing. Other important skills that you'll learn include how to
automatically harden systems with OpenSCAP, audit systems with
auditd, harden the Linux kernel configuration, protect your systems
from malware, and perform vulnerability scans of your systems. As a
bonus, you'll see how to use Security Onion to set up an Intrusion
Detection System. By the end of this new edition, you will
confidently be able to set up a Linux server that will be secure
and harder for malicious actors to compromise. What you will learn
* Prevent malicious actors from compromising a production Linux
system * Leverage additional features and capabilities of Linux in
this new version * Use locked-down home directories and strong
passwords to create user accounts * Prevent unauthorized people
from breaking into a Linux system * Configure file and directory
permissions to protect sensitive data * Harden the Secure Shell
service in order to prevent break-ins and data loss * Apply
security templates and set up auditing Who This Book Is For This
book is for Linux administrators, system administrators, and
network engineers interested in securing moderate to complex Linux
environments. Security consultants looking to enhance their Linux
security skills will also find this book useful. Working experience
with the Linux command line and package management is necessary to
understand the concepts covered in this book.
A comprehensive guide for teaching system administrators,
developers, and security professionals how to create their own
systemd units and maintain system security Key Features Maintain
and troubleshoot systemd services with ease Learn to create,
modify, and reload service files and use systemd utilities Use
cgroups to control resource usage and enhance security Book
DescriptionLinux Service Management Made Easy with systemd will
provide you with an in-depth understanding of systemd, so that you
can set up your servers securely and efficiently. This is a
comprehensive guide for Linux administrators that will help you get
the best of systemd, starting with an explanation of the
fundamentals of systemd management. You'll also learn how to edit
and create your own systemd units, which will be particularly
helpful if you need to create custom services or timers and add
features or security to an existing service. Next, you'll find out
how to analyze and fix boot-up challenges and set system
parameters. An overview of cgroups that'll help you control system
resource usage for both processes and users will also be covered,
alongside a practical demonstration on how cgroups are structured,
spotting the differences between cgroups Version 1 and 2, and how
to set resource limits on both. Finally, you'll learn about the
systemd way of performing time-keeping, networking, logging, and
login management. You'll discover how to configure servers
accurately and gather system information to analyze system security
and performance. By the end of this Linux book, you'll be able to
efficiently manage all aspects of a server running the systemd init
system. What you will learn Use basic systemd utilities to manage a
system Create and edit your own systemd units Create services for
Podman-Docker containers Enhance system security by adding
security-related parameters Find important information with
journald Analyze boot-up problems Configure system settings with
systemd utilities Who this book is forThis book is best suited for
Linux administrators who want to learn more about maintaining and
troubleshooting Linux servers. It will also be useful for aspiring
administrators studying for a Linux certification exam, developers
looking to learn how to create systemd unit files, and security
administrators who want to understand the security settings that
can be used in systemd units and how to control resource usage with
cgroups. Before you dive into this book, you'll need a solid
working knowledge of basic Linux commands.
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
A comprehensive guide to mastering the art of preventing your Linux
system from getting compromised. Key Features Leverage this guide
to confidently deliver a system that reduces the risk of being
hacked Perform a number of advanced Linux security techniques such
as network service detection, user authentication, controlling
special permissions, encrypting file systems, and much more Master
the art of securing a Linux environment with this end-to-end
practical guide Book DescriptionThis book has extensive coverage of
techniques that will help prevent attackers from breaching your
system, by building a much more secure Linux environment. You will
learn various security techniques such as SSH hardening, network
service detection, setting up firewalls, encrypting file systems,
protecting user accounts, authentication processes, and so on.
Moving forward, you will also develop hands-on skills with advanced
Linux permissions, access control, special modes, and more. Lastly,
this book will also cover best practices and troubleshooting
techniques to get your work done efficiently. By the end of this
book, you will be confident in delivering a system that will be
much harder to compromise. What you will learn Use various
techniques to prevent intruders from accessing sensitive data
Prevent intruders from planting malware, and detect whether malware
has been planted Prevent insiders from accessing data that they
aren't authorized to access Do quick checks to see whether a
computer is running network services that it doesn't need to run
Learn security techniques that are common to all Linux distros, and
some that are distro-specific Who this book is forIf you are a
systems administrator or a network engineer interested in making
your Linux environment more secure, then this book is for you.
Security consultants wanting to enhance their Linux security skills
will also benefit from this book. Prior knowledge of Linux is
mandatory.
|
|