Chapter1: Security Threats to Linux Chapter2: Basic Components of Linux Security Chapter3: Basic Security: Facilities Through the Boot Process Chapter4: User Privileges and Permissions Chapter5: Filesystems, Volumes, and Encryption Chapter6: Every Service Is a Potential Risk Chapter7: Networks, Firewalls, and More Chapter8: Networked Filesystems and Remote Access Chapter9: Networked Application Security Chapter10: Kernel Security Risk Mitigation Chapter11: Managing Security Alerts and Updates Chapter12: Building and Maintaining a Security Baseline Chapter13: Testing and Reporting Chapter14: Detecting and Responding to Security Breaches Chapter15: Best Practices and Emerging Technologies
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Please wait while the item is added to your bag...
×
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description,
with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.