Don’t run Linux in production unless you’ve hardened it. Many admins have barely scratched the surface. Let Samba-Team co-founder John Terpstra show you how it’s really done.
Terpstra starts with an eight-item checklist you’d better attend to right now. Once that’s done, you’ll systematically harden network, system, and software access; the kernel; file systems and data storage; authentication and user identity; and communications. (You’ll even learn how to establish secure “chrooted jails” for business-critical apps.)
Security is, of course, never done. Part III focuses on ongoing tasks: network monitoring, log file scanning, patch management, and more. There’s even coverage of setting up a corporate security policy that gains user acceptance -- and works. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.