Categories
Download Securing LINUX Step by Step

Free download Securing LINUX Step by Step

  • Author: David Ranch Lee Brotzman
  • Pages: 120
  • Language: English
  • ISBN/ASIN: 967299209
  • ISBN13: 9780967299204
  • Upload date: 22-05-2017, 20:38
  • Category: Software related

The subtitle says it all: "A Survival Guide for Linux Security". This book is the result of an iterative process of consulting with experts in the field of computer and network security. The list of contributors includes staff at well-known organizations like the Computer Emergency Response Team (CERT) and the U.S. Census Bureau, so it is more than just the two main authors' expertise--it is a collaborative effort of 48 experts.

It is not simply a theoretical book on computer security. First, it details only one Linux distribution, Red Hat 6.0. Users of other distributions will be able to use the book as well, but they will need to fudge things according to the differences between their distribution and Red Hat 6.0. Users of Mandrake 6.x should have no problem users of Slackware will have to adjust a lot of the information on system startup. Debian users will probably find themselves scrambling to map all the RPM package names to Debian package equivalents.

Second, it is a step-by-step walk through the process. The authors don't simply say, "remove package foo"' they walk the reader through the process of removing package foo, with the complete command-line and system response for each command. It may be only one or two steps, but they are there to show you exactly what to type on the command line and what response to expect from the system.

Other description:

This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers, firewalls, parallel processing, and so forth. The examples and instructions are based on the Red Hat version 6.0 release. Red Hat was chosen because it has the largest share of the Linux market, and version 6.0 was chosen because it includes the latest stable release of the Linux kernel, system libraries, utilities, etc. However, the concepts, advice, and procedures in this guide should translate rather easily to other distributions. You may have to explore your system a little to find configuration files that are in different directories, and to determine which versions of the software packages have been installed, but the exploration itself can be a good instructional tool.

This guide takes you, the reader, through the installation process then splits into separate steps for securing a workstation setup and a server setup. The guide discusses basic packet firewalls in terms of protecting services on a single local computer. Finally, the guide discusses a few useful tools for monitoring and testing the security of your system. We try to follow the principle of "defense in depth." No one step is a silver bullet against system attacks, but taken as a whole, they build multiple layers of defense that make life just that much harder for "script kiddies" and dedicated computer criminals.

About the Author

Lee Brotzman is a senior systems programmer for Allied Technology Group, Inc., where he provides contract support in computer security for NASA, NOAA, the Department of Justice, and the FBI. He worked at NASA Goddard Space Flight Center from 1983 to 1995, concentrating in research and development of networked scientific data analysis and distribution systems. During this time, he taught courses in UNIX programming, UNIX Security for Systems Administrators and UNIX Security Toolkits at NASA field centers around the country, a task he continued after leaving NASA to work as aa private consultant in the field of LINUX-based information systems development. Rehired by Allied to support NASIRC and DoJCERT, he currently specializes in assessing exploits and vulnerabilities in UNIX operating systems and analyzing "hacker" tools.

Download links

Abuse


E-book formats: Securing LINUX Step by Step PDF, ePub, mobi, txt, Securing LINUX Step by Step doc, pdb, djvu, fb2, ibooks, azw3, azw, kf8, rtf

Securing LINUX Step by Step free download for iPhone/iPod/iPad, Android, BlackBerry or PC/MAC. Free download links from: Dropbox.com, Zippyshare.com, Depositfiles.com, Uploading.com, Crocko.com, FileFactory.com

Related eBooks