Muutke küpsiste eelistusi

Linux Security Fundamentals [Pehme köide]

  • Formaat: Paperback / softback, 192 pages, kõrgus x laius x paksus: 234x185x13 mm, kaal: 318 g
  • Ilmumisaeg: 28-Dec-2020
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119781469
  • ISBN-13: 9781119781462
Teised raamatud teemal:
  • Pehme köide
  • Hind: 51,84 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 192 pages, kõrgus x laius x paksus: 234x185x13 mm, kaal: 318 g
  • Ilmumisaeg: 28-Dec-2020
  • Kirjastus: Sybex Inc.,U.S.
  • ISBN-10: 1119781469
  • ISBN-13: 9781119781462
Teised raamatud teemal:

Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.

This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include:

  • Security Concepts
  • Encryption
  • Node, Device and Storage Security
  • Network and Service Security
  • Identity and Privacy 
Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.
Introduction xiii
Chapter 1 Using Digital Resources Responsibly
1(14)
Protecting Personal Rights
2(2)
Protecting Digital Privacy
4(3)
What Is Personal Data?
4(1)
Where Might My Personal Data Be Hanging Out?
4(2)
What Are My Responsibilities as a Site Administrator?
6(1)
Can Escaped Genies Be Forced Back into Their Bottles?
6(1)
What Can I Do as a User?
7(1)
Establishing Authenticity
7(2)
Think About the Source
8(1)
Be Aware of Common Threat Categories
8(1)
Summary
9(1)
Back to the Basics
10(1)
Review Questions
11(4)
Chapter 2 What Are Vulnerabilities and Threats?
15(18)
The Basics: What Are We Trying to Accomplish Here?
16(4)
What Are Vulnerabilities and Threats?
17(1)
What Can Be Exploited?
17(1)
Who's Doing the Exploiting?
18(1)
Why Do They Attack?
19(1)
Common Vulnerabilities
20(1)
Software Vulnerabilities
20(1)
Hardware Vulnerabilities
21(1)
Bioware Vulnerabilities
21(1)
Digital Espionage
21(2)
USB Devices
21(1)
Backdoors
22(1)
Wireless Entry Points
22(1)
Stolen Credentials
23(1)
Data Breaches
23(1)
Identity Theft (Besides Breaches)
24(1)
Malware
24(1)
Network-Based Attacks
25(1)
Man-in-the-Middle Attacks
25(1)
Denial-of-Service and Distributed Denial-of-Service Attacks
26(1)
Network Routing Attacks
26(1)
Summary
26(1)
Back to the Basics
27(1)
Review Questions
28(5)
Chapter 3 Controlling Access to Your Assets
33(26)
Controlling Physical Access
34(11)
Understanding Your Devices
34(2)
Protecting Your Devices
36(2)
Managing Authentication Through Effective Password Use
38(6)
Managing Authorization Through Permissions
44(1)
Controlling Network Access
45(5)
Firewalls
45(3)
Virus and Malware Protection
48(1)
Educating Your Users
49(1)
Controlling Software Sources
50(2)
PC Software Repositories
51(1)
Mobile Package Management
51(1)
Summary
52(1)
Back to the Basics
52(2)
Review Questions
54(5)
Chapter 4 Controlling Network Connections
59(22)
Understanding Network Architecture
60(5)
The Transmission Control Protocol
60(1)
The Internet Protocol
61(3)
Understanding the Domain Name System
64(1)
Auditing Networks
65(6)
Network Auditing Tools
66(4)
Automating Audits
70(1)
Securing Networks
71(3)
Patch Your Software
71(2)
Physically Secure Your Infrastructure
73(1)
Secure Your Network Behavior
73(1)
Other Stuff
74(1)
Summary
74(1)
Back to the Basics
75(1)
Review Questions
76(5)
Chapter 5 Encrypting Your Data at Rest
81(12)
What Is Encryption?
82(3)
Encryption Usage Patterns
85(2)
What Should You Encrypt?
85(1)
Understanding Hashing vs. Encryption
86(1)
What Are Blockchains?
86(1)
Encryption Technologies
87(2)
Summary
89(1)
Back to the Basics
89(1)
Review Questions
90(3)
Chapter 6 Encrypting Your Moving Data
93(16)
Website Encryption
94(5)
Why You Should Use Encryption
95(1)
How Website Encryption Works
96(2)
Generating Certificates
98(1)
Email Encryption
99(1)
GNU Privacy Guard
100(1)
Does Gmail Encrypt Your Emails?
100(1)
Working with VPN Connections and Software Repositories
100(5)
Securing Your Actions Using VPNs
101(3)
Securing Transfers from Software Repositories
104(1)
Summary
105(1)
Back to the Basics
105(1)
Review Questions
106(3)
Chapter 7 Risk Assessment
109(16)
Conducting Open Source Intelligence Gathering
111(1)
Accessing Public Vulnerability Databases
112(3)
Vulnerability Data Frameworks
112(1)
Vulnerability Data Formats
113(1)
Vulnerability Data Metrics
114(1)
Vulnerability Data Management Tools
114(1)
Conducting Vulnerability Scans
115(2)
Conducting Penetration Tests
117(2)
Attack Vectors
118(1)
Tooling Frameworks
118(1)
Follow-Up
119(1)
Summary
119(1)
Back to the Basics
120(1)
Review Questions
121(4)
Chapter 8 Configuring System Backups and Monitoring
125(18)
Why You Need to Get Backups Right the First Time
127(5)
Appreciating the Risks
128(1)
Spreading Your Backups Across Multiple Sites
129(1)
Testing Your Backups
130(1)
Meeting Regulatory Compliance
131(1)
Backup Types
132(1)
Incremental Backups
132(1)
Differential Backups
133(1)
Backup Life Cycles
133(1)
Multitier Backups
133(2)
Multisite Storage Solutions
134(1)
Disaster Recovery Planning
134(1)
Configuring Monitoring and Alerts
135(2)
Working with System Logs
135(1)
Intrusion Detection
136(1)
Summary
137(1)
Back to the Basics
138(1)
Review Questions
139(4)
Chapter 9 Resource Isolation Design Patterns
143(12)
Configuring Network Firewalling
145(3)
Balancing Public and Private Networks
145(2)
Building Isolated Development Environments
147(1)
Working with Sandbox Environments
148(2)
Use Cases for Sandboxes
148(1)
Sandbox Designs
149(1)
Controlling Local System Access
150(2)
Configuring Mandatory Access Controls
150(1)
Setting Usage Quotas
151(1)
Summary
152(1)
Back to the Basics
152(1)
Review Questions
153(2)
Appendix Answers to Review Questions
155(12)
Chapter 1 Using Digital Resources Responsibly
156(1)
Chapter 2 What are Vulnerabilities and Threats?
157(1)
Chapter 3 Controlling Access to Your Assets
158(2)
Chapter 4 Controlling Network Connections
160(1)
Chapter 5 Encrypting Your Data at Rest
161(1)
Chapter 6 Encrypting Your Moving Data
162(1)
Chapter 7 Risk Assessment
163(2)
Chapter 8 Configuring System Backups and Monitoring
165(1)
Chapter 9 Resource Isolation Design Patterns
166(1)
Index 167
David Clinton is a Linux server admin and Amazon Web Services solutions architect who has worked with IT infrastructure in both academic and enterprise environments. He has created video courses teaching AWS and Linux administration, server virtualization, and IT security for Pluralsight. He has also written or cowritten a dozen technology books, including AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam, Second Edition, and AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam.