Text
Security Strategies in Linux Platforms and Applications
Part 1 Is Linux Really Secure?
Chapter 2 Security Threats to Linux
Chapter 2 Basic Components of Linux Security
Part 2 Layered Security and Linux
Chapter 3 Starting Off: Getting Up and Running
Chapter 4 User Privileges and Permissions
Chapter 5 Filesystems, Volumes, and Encryption
Chapter 6 Securing Services
Chapter 7 Networks, Firewalls, and More
Chapter 8 Networked Filesystems and Remote Access
Chapter 9 Networked Application Security
Chapter 10 Kernel Security Mitigation
Part 3 Building a Layered Linux Security Strategy
Chapter 11 Managing Security Alerts and Updates
Chapter 12 Building and Maintaining a Security Baseline
Chapter 13 Testing and Reporting
Chapter 14 Detecting and Responding to Security Breaches
Chapter 15 Best Practices and Emerging Technologies
5555129929 | 005.8 JAN s | Pusat (Sirkulasi) | Available |
No other version available