Security Strategies in Linux Platforms and Applications

·
· Jones & Bartlett Learning
Ebook
500
Pages

About this ebook

The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more. Mapped to Linux+ that spans Linux Essentials and Linux SecurityAccounts for the latest Linux distributions and kernels, including end of life for CentOSCovers new Linux-based technologies and security strategiesDiscusses the Microsoft acquisition of Red Hat and rise of commercialized Open SourceCoverage of virtualization, including coverage of Docker and other sandboxing technologies like FirejaiInstructor resources include an Instructor Guide, slides in PowerPoint format, a test guide, sample syllabi, Time on Task documentation, and a content map Linux Operating SystemsIntroduction to UNIX/LinuxLinux Operating System SecurityLinux AdministrationSecuring Linux SystemsLinux Networking and Security © 2024 | 500 pages

About the author

RIC MESSIER has been working with Unix and Unix-like operating systems since the mid-1980s. In the intervening decades, he has done system administration, network engineering, penetration testing, and programming; developed managed security services; and worked in operations security and a number of other jobs in between.Ric is a security professional who has worked with a number of companies from large Internet service providers to small software companies. He has run a small networking and security consulting practice for the last several years. Additionally, he has taught courses at both the graduate and undergraduate level. Currently, in addition to writing books and recording training videos, he is a Principal Consultant with Mandiant.' Michael Jang (RHCE, LPIC-2, UCP, Linux+, MCP) has been a freelance technical writer since 1998. He had previously worked for more than 10 years as a specialist engineer at Boeing Commercial Airplane Group. Michael has written white papers on new products and processes. He's also the author of more than two-dozen IT books, including LPIC-1 In Depth (2009) and Ubuntu Server Administration Course (for VTC in 2009). Finally, Michael travels overseas extensively to troubleshoot IT issues and manage projects.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.