万本电子书0元读

万本电子书0元读

顶部广告

Practical Linux Security Cookbook电子书

售       价:¥

7人正在读 | 0人评论 9.8

作       者:Tajinder Kalsi

出  版  社:Packt Publishing

出版时间:2016-04-01

字       数:99.7万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
Secure your Linux machines and keep them secured with the help of exciting recipes About This Book This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster. More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasks Who This Book Is For Practical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux File systems and administration. You should be familiar with basic Linux commands. Understanding Information security and its risks to a Linux system is also helpful in understanding the recipes more easily. However, even if you are unfamiliar with Information security, you will be able to easily follow and understand the recipes discussed. Since Linux Security Cookbook follows a practical approach, following the steps is very easy. What You Will Learn Learn about various vulnerabilities and exploits in relation to Linux systems Configure and build a secure kernel and test it Learn about file permissions and security and how to securely modify files Explore various ways to authenticate local users while monitoring their activities. Authenticate users remotely and securely copy files on remote systems Review various network security methods including firewalls using iptables and TCP Wrapper Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more Understand Bash vulnerability/security and patch management In Detail With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system. Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security. With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems. Style and approach An easy-to-follow cookbook with step-by-step practical recipes covering the various Linux security administration tasks. Each recipe has screenshots, wherever needed, to make understanding more easy.
目录展开

Practical Linux Security Cookbook

Table of Contents

Practical Linux Security Cookbook

Credits

About the Author

About the Reviewer

www.PacktPub.com

eBooks, discount offers, and more

Why Subscribe?

Preface

What this book covers

What you need for this book

Who this book is for

Sections

Getting ready

How to do it…

How it works…

There's more…

See also

Conventions

Reader feedback

Customer support

Downloading the example code

Downloading the color images of this book

Errata

Piracy

Questions

1. Linux Security Problems

Introduction

The security policy of Linux

Developing a security policy

Configuring password protection

How to do it…

How it works…

Configuring server security

How to do it…

How it works…

There's more…

Security controls

Conducting integrity checks of the installation medium using checksum

Getting ready

How to do it…

How it works…

See also

Using the LUKS disk encryption

Getting ready

How to do it…

How it works…

Making use of sudoers – configuring sudo access

Getting ready

How to do it…

How it works…

There's more…

Vulnerability assessment

Scanning hosts with Nmap

Getting ready

How to do it…

How it works…

See also

Gaining a root on a vulnerable Linux system

Getting ready

How to do it…

How it works

There's more…

Null or default passwords

IP spoofing

Eavesdropping

Service vulnerabilities

Denial of Service (DoS) attack

2. Configuring a Secure and Optimized Kernel

Introduction

Requirements for building and using a kernel

Creating a USB boot media

Getting ready

How to do it…

How it works…

Retrieving a kernel source

Getting ready

How to do it…

How it works…

Configuring and building a kernel

Getting ready

How to do it…

How it works…

Installing and booting from a kernel

Getting ready

How to do it…

How it works…

Testing and debugging a kernel

Configuring a console for debugging using Netconsole

Getting ready

How to do it…

How it works

There's more…

Debugging a kernel on boot

How to do it…

3. Local Filesystem Security

Viewing file and directory details using the ls command

Getting ready

How to do it…

How it works…

Changing the file permissions using the chmod command

Getting ready

How to do it…

How it works…

There's more...

Implementing access control list (ACL)

Getting ready

How to do it…

There's more…

File handling using the mv command (moving and renaming)

Getting ready…

How it works…

There's more…

Install and configure a basic LDAP server on Ubuntu

Getting ready

How to do it…

How it works…

4. Local Authentication in Linux

User authentication and logging

Getting Started

How to do it...

How it works...

Limiting the login capabilities of users

Getting ready

How to do it...

How it works...

Monitoring user activity using acct

Getting started

How to do it?

How it works...

Login authentication using a USB device and PAM

Getting ready

How to do it…

How it works...

There's more...

Defining user authorization controls

Getting started...

How to do it...

How it works...

5. Remote Authentication

Remote server/host access using SSH

Getting ready

How to do it…

How it works…

Disabling or enabling SSH root login

Getting ready

How to do it…

How it works…

There's more…

Restricting remote access with key-based login into SSH

Getting ready

How to do it...

How it works...

Copying files remotely

Getting ready

How to do it...

How it works...

Setting up a Kerberos server with Ubuntu

Getting ready

How to do it...

How it works...

6. Network Security

Managing the TCP/IP network

Getting ready

How to do it...

How it works...

Using Iptables to configure a firewall

Getting Ready

How to do it...

How it works...

Blocking spoofed addresses

Getting Ready

How to do it...

How it works...

Blocking incoming traffic

Getting Ready

How to do it...

How it works...

Configuring and using the TCP Wrapper

Getting Ready

How to do it?

How it works...

7. Security Tools

Linux sXID

Getting Ready

How to do it...

How it works...

PortSentry

Getting Ready

How to do it?

How it works...

Using Squid proxy

Getting Ready

How to do it...

How it works...

OpenSSL Server

Getting Ready

How to do it...

How it works...

Tripwire

Getting Ready

How to do it...

How it works...

Shorewall

Getting ready

How to do it...

How it works...

8. Linux Security Distros

Kali Linux

Getting ready

How to do it...

How it works...

pfSense

Getting ready

How to do it...

How it works...

DEFT – Digital Evidence and Forensic Toolkit

Getting ready

How to do it...

How it works...

NST – Network Security Toolkit

Getting ready

How to do it...

How it works...

Helix

Getting ready

How to do it?

How it works...

9. Patching a Bash Vulnerability

Understanding the bash vulnerability through Shellshock

Getting Ready

How to do it…

How it works…

Shellshock's security issues

Getting Ready

How to do it…

How it works…

The patch management system

Getting ready

How to do it…

How it works…

Applying patches on the Linux systems

Getting ready

How to do it...

How it works...

10. Security Monitoring and Logging

Viewing and managing log files using Logcheck

Getting ready

How to do it…

How it works…

Monitoring a network using Nmap

Getting ready

How to do it…

How it works…

Using glances for system monitoring

Getting ready

How to do it…

How it works…

Monitoring logs using MultiTail

Getting ready

How to do it…

How it works…

Using system tools – Whowatch

Getting ready

How to do it…

How it works

Using system tools – stat

Getting ready

How to do it…

How it works

Using system tools – lsof

Getting ready

How to do it…

How it works

Using system tools – strace

Getting ready

How to do it…

How it works

Using Lynis

Getting ready

How to do it…

How it works

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部