David Clinton - Linux Security Fundamentals
Здесь есть возможность читать онлайн «David Clinton - Linux Security Fundamentals» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:Linux Security Fundamentals
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:3 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 60
- 1
- 2
- 3
- 4
- 5
Linux Security Fundamentals: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Linux Security Fundamentals»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
The Sybex™ method for teaching Linux® security concepts
Interactive learning environment
www.wiley.com/go/sybextestprep Linux Security Fundamentals
Linux Security Fundamentals
Linux Security Fundamentals — читать онлайн ознакомительный отрывок
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Linux Security Fundamentals», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
Linux ®Security Fundamentals
David Clinton
Copyright © 2021 by John Wiley & Sons, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-1-119-78146-2
ISBN: 978-1-119-78157-8 (ebk)
ISBN: 978-1-119-78156-1 (ebk)
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions
.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com
. For more information about Wiley products, visit www.wiley.com
.
Library of Congress Control Number: 2020945159
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Linux is a registered trademark of Linus Torvalds. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.
Acknowledgments
I would like to thank my wife for all her help and support through the long and demanding process of writing these books. And, once again, I’m indebted to all the great people at Wiley who helped me turn a plain old manuscript into a great teaching tool.
About the Author
David Clinton is a Linux server admin and AWS Solutions Architect who has worked with IT infrastructure in both academic and enterprise environments. He has authored technology books—including AWS Certified Solutions Architect Study Guide: Associate SAA-C01 Exam, Third Edition (Sybex, 2020) and the Ubuntu Bible (Wiley, 2020)—and created more than 25 video courses teaching AWS and Linux administration, server virtualization, and IT security for Pluralsight.
In a previous life, David spent 20 years as a high school teacher. He currently lives in Toronto, Canada with his wife and family and can be reached through his website: https://bootstrap-it.com.
About the Technical Editor
Ben Piperis a cloud and networking consultant who has co-authored multiple AWS study guides, including the AWS Certified Solutions Architect Study Guide: Associate SAA-C01 Exam, Second Edition (Sybex, 2019) and the AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam (Sybex, 2019). He’s also created more than 20 technology training courses covering Amazon Web Services and Cisco routing and switching. You can contact Ben by visiting his website: https://benpiper.com.
CONTENTS
1 Cover
2 Title Page Linux ® Security Fundamentals David Clinton
3 Copyright
4 Acknowledgments
5 About the Author
6 About the Technical Editor
7 Introduction What Does This Book Cover? Interactive Online Learning Environment and Test Bank
8 Chapter 1 Using Digital Resources Responsibly Protecting Personal Rights Protecting Digital Privacy Establishing Authenticity Summary Back to the Basics Review Questions
9 Chapter 2 What Are Vulnerabilities and Threats? The Basics: What Are We Trying to Accomplish Here? Common Vulnerabilities Digital Espionage Stolen Credentials Malware Network-Based Attacks Summary Back to the Basics Review Questions
10 Chapter 3 Controlling Access to Your Assets Controlling Physical Access Controlling Network Access Controlling Software Sources Summary Back to the Basics Review Questions
11 Chapter 4 Controlling Network Connections Understanding Network Architecture Auditing Networks Securing Networks Summary Back to the Basics Review Questions
12 Chapter 5 Encrypting Your Data at Rest What Is Encryption? Encryption Usage Patterns Encryption Technologies Summary Back to the Basics Review Questions
13 Chapter 6 Encrypting Your Moving Data Website Encryption Email Encryption Working with VPN Connections and Software Repositories Summary Back to the Basics Review Questions
14 Chapter 7 Risk Assessment Conducting Open Source Intelligence Gathering Accessing Public Vulnerability Databases Conducting Vulnerability Scans Conducting Penetration Tests Summary Back to the Basics Review Questions
15 Chapter 8 Configuring System Backups and Monitoring Why You Need to Get Backups Right the First Time Backup Types Multitier Backups Configuring Monitoring and Alerts Summary Back to the Basics Review Questions
16 Chapter 9 Resource Isolation Design Patterns Configuring Network Firewalling Working with Sandbox Environments Controlling Local System Access Summary Back to the Basics Review Questions
17 Appendix Answers to Review Questions Chapter 1: Using Digital Resources Responsibly Chapter 2: What are Vulnerabilities and Threats? Chapter 3: Controlling Access to Your Assets Chapter 4: Controlling Network Connections Chapter 5: Encrypting Your Data at Rest Chapter 6: Encrypting Your Moving Data Chapter 7: Risk Assessment Chapter 8: Configuring System Backups and Monitoring Chapter 9: Resource Isolation Design Patterns
Читать дальшеИнтервал:
Закладка:
Похожие книги на «Linux Security Fundamentals»
Представляем Вашему вниманию похожие книги на «Linux Security Fundamentals» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «Linux Security Fundamentals» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.