Jump to content

Featured Replies

Posted
Linux System Security

Linux System Security

An Administrator's Guide to Open Source Security Tools

by Scott Mann, Ellen L. Mitchell

Publisher Prentice Hall Professional
Published Date 2000
Page Count 564
Categories Computers / Security / Network Security, Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux, Computers / Security / General
Language EN
Average Rating 5 (based on 1 ratings)
Maturity Rating No Mature Content Detected
ISBN 0130158070
Book Cover -- One of the first Linux security books to cover Bastille, a program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised.

-- New chapter on network sniffers and port scanners used to detect intruders.

-- Updated for Redhat 7.2.

As more companies are moving to Linux for mission-critical applications, security becomes a major issue. This guide explains the pros and cons of the most the valuable open source security tools and is complete with implementation details. It gives detailed instructions on the implementation, configuration, and use of publicly available tools and features of Linux as they relate to Linux security. Essential background information is provided in the book's introductory chapters. Administrators will learn to: Prepare Linux systems for a production environment; Identify vulnerabilities, and planning for security administration; Configure Linux-based firewalls, authentication, and encryption; Secure filesystems, email, web servers, and other key applications; Protect mixed Linux/Unix and Windows environments. New to this Edition: Updated for Redhat 7.2; One of the first Linux security books to cover Bastille, a hardening program which tightens system security and can even lock down the entire system in cases where the system is seriously compromised; New chapter on network sniffers and port scanners used to detect intruders; Will Cover Open SSH - the new open source version of a popular suite of connectivity tools which allow you to login into remote computers and execute commands on these computers. Open SSH contains encryption capabilities that encrypts all traffic including passwords.

More Information
  • Views 49
  • Created
  • Last Reply

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.