Normal view MARC view ISBD view

Security strategies in Linux platforms and applications / Michael Jang and Ric Messier.

By: Jang, Michael H.
Contributor(s): Messier, Ric.
Series: Jones & Bartlett Learning information systems security & assurance series.Burlington, MA, USA : Jones & Bartlett Learning, ©2017Edition: Second edition.Description: xxiii, 514 pages : illustrations ; 23 cm.Content type: text. ISBN: 9781284090659; 1284090655.Subject(s): Linux | Operating systems (Computers) | Computer securityDDC classification: 005.8/J25 Other classification: COECS/E
Contents:
Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
Summary: "The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"--
Item type Current location Call number Status Date due Barcode
Books Books College Library
General Reference Section
COECS/E 005.8/J25 (Browse shelf) Available 83144

Includes bibliographical references and index.

Security threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.

"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"--

There are no comments for this item.

Log in to your account to post a comment.