DMCA. Copyrighted Work that you can Claim.
Base have 820 524 books.
Search: 


πŸ“™ Hardening Linux (Volume 0) by James Turnbull β€” download pdf


After reading this book, I think it is going to be the mandatory companion I hand out to new Linux administrators, along with Essential System Administration. The first 6 chapters are exceptional. I can't say enough good things about them. The coverage of PAM is better than anything I have seen. The coverage of authentication, groups, users and best practices surrounding them was very good as well. The logging chapter alone is probably worth the purchase of the book. After the first section, the book covers more specific topics that are of less interest to me. I realize that a lot of people use email, of all kinds. Chapter 7, 8 and 9 cover email, and I just wasn't that excited about it. Chapter 10 covered securing FTP, which is nice, and 11 covers Bind. I guess I wonder why some of the topics were chosen. There are whole books on email and bind, available, but there isn't always good material for some other services, like CUPS, maybe some web-based administration tools, or SELinux. The coverage of topics that made the table of contents are very good. I would say if you are new to Linux Security, or a seasoned player looking for just another reference, this book is great.

About book:

About file:

  • File size: 2 775 995
  • Format: pdf


Security code:
Download button

Similar books results


Hardening Linux
Hardening Linux pdf free by James Turnbull

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book ...

Hardening Linux
Hardening Linux free pdf by James Turnbull (auth.)

β€œHardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks. The b...

Hardening Linux
Hardening Linux free download by John Terpstra, Paul Love, Ronald P. Reck, Tim Scanlon

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks-before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as o...

HackNotes Linux and Unix Security Portable Reference
HackNotes Linux and Unix Security Portable Reference download pdf by Nitesh Dhanjani

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. This book will teach you how to protect and h...

Hardening Linux
Hardening Linux free pdf by James Turnbull

James Turnbull is an IT&T Security Consultant at the Commonwealth Bank of Australia. He is an experienced infrastructure architect with a background in Linux/Unix, AS/400, Windows, and Storage systems. He has been involved in security consulting, infrastr...

HackNotes (tm) Linux and Unix Security Portable Reference
HackNotes (tm) Linux and Unix Security Portable Reference download pdf by Nitesh Dhanjani

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. This book will teach you how to protect and h...

Hardening Windows Systems
Hardening Windows Systems free pdf by Roberta Bragg

Ok, so you want to secure your current, already (maybe poorly) implemented Windows networking environment. This may be the right book for you to get you on the path to better security. Note I did not say good security, I said better. I bought the book Ha...

Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation) epub download by Thomas Sterling

Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial application...

Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation) free download by Thomas Sterling

Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial application...