TY - GEN AU - Jang,Michael H. TI - Security strategies in Linux platforms and applications T2 - Jones & Bartlett Learning information systems security & assurance series SN - 076379189X U1 - 005.8,JAN PY - 2011/// CY - Sudbury, MA PB - Jones & Bartlett Learning KW - Computer security KW - Operating systems (Computers) N1 - ONE. Is Linux Really Secure? (Page-1), Security Threats to Linux(Page-2), Basic Components of Linux Security(Page-28), TWO. Layered Security and Linux(Page-53), Basic Security: Facilities Through the Boot Process(Page-54), User Privileges and Permissions(Page-83), Filesystems, Volumes, and Encryption(Page-114), Every Service Is a Potential Risk(Page-146), Networks, Firewalls, and More(Page-176), Networked File systems and Remote Access(Page-218), Networked Application Security(Page-251), Kernel Security Risk Mitigation(Page-283),THREE. Building a Layered Linux Security Strategy(Page-315), Managing Security Alerts and Updates(Page-316), Building and Maintaining a Security Baseline(Page-352), Testing and Reporting(Page-378), Detecting and Responding to Security Breaches(Page-418), Best Practices and Emerging Technologies(Page-446) ER -