Thursday, June 19, 2014

PDF⋙ Practical Linux Security Cookbook by Tajinder Kalsi

Practical Linux Security Cookbook by Tajinder Kalsi

Practical Linux Security Cookbook

Practical Linux Security Cookbook by Tajinder Kalsi PDF, ePub eBook D0wnl0ad

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasks

Book Description

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.

Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.

With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.

With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.

What you will learn

  • Learn about various vulnerabilities and exploits in relation to Linux systems
  • Configure and build a secure kernel and test it
  • Learn about file permissions and security and how to securely modify files
  • Explore various ways to authenticate local users while monitoring their activities.
  • Authenticate users remotely and securely copy files on remote systems
  • Review various network security methods including firewalls using iptables and TCP Wrapper
  • Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
  • Understand Bash vulnerability/security and patch management

About the Author

Tajinder Kalsi is an innovative professional with more than 9 years of progressive experience within the information security industry. He has a good amount of knowledge and experience in web application testing, vulnerability assessment, network penetration testing, and risk assessment.

At present, he is working as an independent information security consultant. He started his career with Wipro as a technical associate, and later on he became an ISMS consultant cum technical evangelist. In his free time, he conducts seminars in colleges all across India on various topics, and he has covered more than 125 colleges and spoken to 10,000+ students.

In the past, he has reviewed books such as Web Application Penetration Testing with Kali Linux, Mastering Kali Linux for Advanced Penetration Testing, and Advanced Wireless Penetration Testing for Highly-Secured Environments.

You can find him on Facebook at www.facebook.com/tajinder.kalsi.tj, or contact him on his website at www.tajinderkalsi.com.

Table of Contents

  1. Linux Security Problems
  2. Configuring a Secure and Optimized Kernel
  3. Local Filesystem Security
  4. Local Authentication in Linux
  5. Remote Authentication
  6. Network Security
  7. Security Tools
  8. Linux Security Distros
  9. Patching a Bash Vulnerability
  10. Security Monitoring and Logging


From reader reviews:

Lauren Robinson:

Book is written, printed, or highlighted for everything. You can realize everything you want by a reserve. Book has a different type. To be sure that book is important factor to bring us around the world. Beside that you can your reading skill was fluently. A guide Practical Linux Security Cookbook will make you to be smarter. You can feel far more confidence if you can know about every little thing. But some of you think that open or reading any book make you bored. It is not necessarily make you fun. Why they may be thought like that? Have you in search of best book or suitable book with you?


John Barstow:

This book untitled Practical Linux Security Cookbook to be one of several books this best seller in this year, here is because when you read this reserve you can get a lot of benefit in it. You will easily to buy that book in the book shop or you can order it through online. The publisher of this book sells the e-book too. It makes you quickly to read this book, since you can read this book in your Touch screen phone. So there is no reason for you to past this e-book from your list.


Bernice Capps:

That reserve can make you to feel relax. This book Practical Linux Security Cookbook was bright colored and of course has pictures on the website. As we know that book Practical Linux Security Cookbook has many kinds or style. Start from kids until teens. For example Naruto or Investigator Conan you can read and believe that you are the character on there. Therefore not at all of book tend to be make you bored, any it makes you feel happy, fun and relax. Try to choose the best book for yourself and try to like reading which.




Read Practical Linux Security Cookbook by Tajinder Kalsi for online ebook

Practical Linux Security Cookbook by Tajinder Kalsi Free PDF d0wnl0ad, audio books, books to read, good books to read, cheap books, good books, online books, books online, book reviews epub, read books online, books to read online, online library, greatbooks to read, PDF best books to read, top books to read Practical Linux Security Cookbook by Tajinder Kalsi books to read online.

Practical Linux Security Cookbook by Tajinder Kalsi Doc

Practical Linux Security Cookbook by Tajinder Kalsi Mobipocket
Practical Linux Security Cookbook by Tajinder Kalsi EPub

No comments:

Post a Comment