×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

How to Cheat at Securing Linux
     

How to Cheat at Securing Linux

1.0 1
by James Stanger, Raven Alder, Eric S. Seagren
 

See All Formats & Editions

Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system.

This book teaches Linux system administrators how to protect their servers from malicious threats.

As with any technologies,

Overview

Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system.

This book teaches Linux system administrators how to protect their servers from malicious threats.

As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).

This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.

The Perfect Reference for the Multitasked SysAdmin
• Discover Why "Measure Twice, Cut Once" Applies to Securing Linux
• Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases
• Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job

Editorial Reviews

This is a comprehensive, modern guide to securing today's Linux systems and networks. Think of it as "defense in depth" in depth: detailed guidance on using open source tools for everything from rootkit detection to protecting your databases.

James Stanger starts with a high-level assessment of the pros and cons of free solutions, plus guidance on evaluating specific open source options. Next, you'll walk through hardening Linux boxes and other devices inside your network perimeter (avoiding the "hard exterior/soft squishy interior" malady that affects so many networks). Stanger shows how to penetration-test your systems, then thoroughly covers Snort intrusion detection (including significant enhancements in version 2.6).

Also covered in depth: authentication; firewalling; resisting sniffing attacks; toughening perimeter security with VPNs; using bastion hosts; and hardening Apache. Throughout, you'll find loads of diagrams, sample commands, and tips: all you need to actually do this stuff. Bill Camarda, from the December 2007 Read Only

Product Details

ISBN-13:
9781597492072
Publisher:
Elsevier Science
Publication date:
09/01/2007
Series:
How to Cheat Series
Pages:
434
Product dimensions:
0.88(w) x 7.50(h) x 9.25(d)

Related Subjects

Meet the Author

Dr. James Stanger is a web technologist, security consultant, and open source advocate. He is currently President and Chief Certification Architect at Certification Partners, LLC, where he develops the Certified Internet Web Professional and the CTP+ certification programs. He is active in the open source movement as well as with the Linux Professional Institute. He is a contributing author of the LPI Linux Certification in a Nutshell, 2nd Edition, author of How to Cheat at Securing Linux. He has Stanger has created certifications and courses of instruction for companies and organizations such as CIW, IBM, Symantec, and CompTIA. He currently is President and Chief Certification Architect of Certification Partners, LLC, and Chair of the Linux Professional Institute Advisory Council. He also sits on several boards and councils, including the CompTIA Network+ and Server+ advisory committees, as well as for Kaplan University, American Public University System, Mesa Community College, and Snow College. He is also a social networking and Web 2.0 consultant. A respected speaker, he has been invited to present at various forums in the United Kingdom, China, and North America. Dr. Stanger was an educator and consultant, holding teaching positions at the University of California at Riverside, the University of Redlands, and Crafton Hills College. Dr. Stanger earned a B.A. and a Masters degree from Brigham Young University and a Ph.D. from the University of California at Riverside. He is a CIW Master Administrator, and also holds the Linux+, Security+, A+, and Convergence Technologies Professional (CTP) certifications.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

How To Cheat At Securing Linux 1 out of 5 based on 0 ratings. 1 reviews.
Anonymous 6 months ago
Ghbbfffv rrfg gggg g mhhn y qy ,nbb