How to Cheat at Securing Linux
()
About this ebook
This book teaches Linux system administrators how to protect their servers from malicious threats.
As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).
This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.
The Perfect Reference for the Multitasked SysAdmin
* Discover Why "Measure Twice, Cut Once" Applies to Securing Linux
* Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases
* Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job
James Stanger
Dr. James Stanger is a web technologist, security consultant, and open source advocate. He is currently President and Chief Certification Architect at Certification Partners, LLC, where he develops the Certified Internet Web Professional and the CTP+ certification programs. He is active in the open source movement as well as with the Linux Professional Institute. He is a contributing author of the LPI Linux Certification in a Nutshell, 2nd Edition, author of How to Cheat at Securing Linux. He has Stanger has created certifications and courses of instruction for companies and organizations such as CIW, IBM, Symantec, and CompTIA. He currently is President and Chief Certification Architect of Certification Partners, LLC, and Chair of the Linux Professional Institute Advisory Council. He also sits on several boards and councils, including the CompTIA Network+ and Server+ advisory committees, as well as for Kaplan University, American Public University System, Mesa Community College, and Snow College. He is also a social networking and Web 2.0 consultant. A respected speaker, he has been invited to present at various forums in the United Kingdom, China, and North America. Dr. Stanger was an educator and consultant, holding teaching positions at the University of California at Riverside, the University of Redlands, and Crafton Hills College. Dr. Stanger earned a B.A. and a Masters degree from Brigham Young University and a Ph.D. from the University of California at Riverside. He is a CIW Master Administrator, and also holds the Linux+, Security+, A+, and Convergence Technologies Professional (CTP) certifications.
Related to How to Cheat at Securing Linux
Related ebooks
Scripting VMware Power Tools: Automating Virtual Infrastructure Administration: Automating Virtual Infrastructure Administration Rating: 1 out of 5 stars1/5Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat Rating: 4 out of 5 stars4/5How to Cheat at IIS 7 Server Administration Rating: 0 out of 5 stars0 ratingsHow to Cheat at Securing Your Network Rating: 0 out of 5 stars0 ratingsDBAs Guide to Databases Under Linux Rating: 0 out of 5 stars0 ratingsInfoSecurity 2008 Threat Analysis Rating: 0 out of 5 stars0 ratingsHow to Cheat at Windows System Administration Using Command Line Scripts Rating: 0 out of 5 stars0 ratingsJuniper(r) Networks Secure Access SSL VPN Configuration Guide Rating: 5 out of 5 stars5/5Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization Rating: 0 out of 5 stars0 ratingsSecure Your Network for Free Rating: 0 out of 5 stars0 ratingsHow to Cheat at Securing a Wireless Network Rating: 2 out of 5 stars2/5How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access Rating: 0 out of 5 stars0 ratingsMicrosoft PowerShell, VBScript and JScript Bible Rating: 0 out of 5 stars0 ratingsHow to Cheat at VoIP Security Rating: 0 out of 5 stars0 ratingsSSH A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsWindows to Linux Migration Toolkita: Your Windows to Linux Extreme Makeover Rating: 0 out of 5 stars0 ratingsLINUX CLEARLY EXPLAINED Rating: 2 out of 5 stars2/5Ubuntu Linux Secrets Rating: 4 out of 5 stars4/5Linux Kernel A Complete Guide - 2020 Edition Rating: 1 out of 5 stars1/5Practical Linux Security Cookbook Rating: 0 out of 5 stars0 ratingsManaging Online Risk: Apps, Mobile, and Social Media Security Rating: 0 out of 5 stars0 ratingsVPN Third Edition Rating: 0 out of 5 stars0 ratingsInstant Debian - Build a Web Server Rating: 0 out of 5 stars0 ratingsEthereal Packet Sniffing Rating: 0 out of 5 stars0 ratingsAsynchronous Android Rating: 4 out of 5 stars4/5Virtual machine A Complete Guide Rating: 0 out of 5 stars0 ratingsMicrosoft Forefront UAG 2010 Administrator's Handbook Rating: 0 out of 5 stars0 ratings
Security For You
Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5
Reviews for How to Cheat at Securing Linux
0 ratings0 reviews