Security strategies in Linux platforms and applications / Michael Jang.

By: Jang, Michael HSeries: Jones & Bartlett Learning information systems security & assurance series: Publisher: Sudbury, MA : Jones & Bartlett Learning, c2011Description: xxiii, 509 p. : ill. ; 24 cmISBN: 076379189X; 9780763791896Subject(s): Computer security | Operating systems (Computers)DDC classification: 005.8,JAN
Contents:
ONE. Is Linux Really Secure? (Page-1), Security Threats to Linux(Page-2), Basic Components of Linux Security(Page-28), TWO. Layered Security and Linux(Page-53), Basic Security: Facilities Through the Boot Process(Page-54), User Privileges and Permissions(Page-83), Filesystems, Volumes, and Encryption(Page-114), Every Service Is a Potential Risk(Page-146), Networks, Firewalls, and More(Page-176), Networked File systems and Remote Access(Page-218), Networked Application Security(Page-251), Kernel Security Risk Mitigation(Page-283),THREE. Building a Layered Linux Security Strategy(Page-315), Managing Security Alerts and Updates(Page-316), Building and Maintaining a Security Baseline(Page-352), Testing and Reporting(Page-378), Detecting and Responding to Security Breaches(Page-418), Best Practices and Emerging Technologies(Page-446).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,JAN (Browse shelf) Link to resource Available Almirah No.9, Shelf No.1 MCS37457
Total holds: 0

ONE. Is Linux Really Secure? (Page-1), Security Threats to Linux(Page-2), Basic Components of Linux Security(Page-28), TWO. Layered Security and Linux(Page-53), Basic Security: Facilities Through the Boot Process(Page-54), User Privileges and Permissions(Page-83), Filesystems, Volumes, and Encryption(Page-114), Every Service Is a Potential Risk(Page-146), Networks, Firewalls, and More(Page-176), Networked File systems and Remote Access(Page-218), Networked Application Security(Page-251), Kernel Security Risk Mitigation(Page-283),THREE. Building a Layered Linux Security Strategy(Page-315), Managing Security Alerts and Updates(Page-316), Building and Maintaining a Security Baseline(Page-352), Testing and Reporting(Page-378), Detecting and Responding to Security Breaches(Page-418), Best Practices and Emerging Technologies(Page-446).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.