FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
|
|
- Title Securing & Optimizing Linux, RedHat Edition: A Hands on Guide for Linux Professionals
- Author(s) Gerhard Mourani
- Publisher: Opendocs Llc; Pap/Cdr edition (July 2000)
- Paperback 485 pages
- eBook PDF (395 pages, 2.2 MB)
- Language: English
- ISBN-10: 0970033001
- ISBN-13: 978-0970033000
- Share This:
This book shows you how to build a secure, reliable and clean network from the ground up, with optimizations and security, using RedHat Linux 7.x as a base OS.
This book presents everyhting you need to know clearly, concisely, and in an extreemly well organized fashion. Each chapter is well organized starting with an introduction on what the contents of the chapter are, why the items in the chapter have to be covered and then a complete description of how to implement the specific features.
The chapters are in logical order, so you always know the order of things. HOWTO's are mostly written in isolation from each one to another, not the chapters of this book: they are consistent and follow a well organized flow.
If you want to take advantage of Linux's versatility as a server operating system, and do it in the most secure and efficient manner, you can find no better book than this one. In addition to operating system configuration there are many chapters individually dedicated to installing and configuring specific Linux server applications such as Sendmail, SQL server, Apache, BIND, and many more.
About the Authors- N/A
- Unix/Linux Security
- Unix/Linux System Administration
- Core Linux
- Computer, Networks, and Information Security
- Securing & Optimizing Linux, RedHat Edition: A Hands on Guide for Linux Professionals
- The Mirror Site (1) - PDF
- The Mirror Site (2) - HTML
- The Mirror Site (3) - PDF
-
UNIX System Security: A Guide for Users & System Administrators
This book begins by examining four high-profile breaches of UNIX security as illustrations of how a UNIX system can be attacked. It then provides the information necessary to protect against these forms of attack, and offers the tools.
-
Kali Linux: Assuring Security by Penetration Testing
This book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing to detailed coverage.
-
The SELinux Notebook, 4th Edition (Richard Haines)
If you want an effective means of securing your Linux system (and who doesn't?), this book provides the means. The 4th edition covers the integration of SELinux within Android.
-
O'Reilly® Practical UNIX and Internet Security, Second Edition
This book is a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection.
-
Next-Generation Firewalls For Dummies (Palo Alto Networks)
This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.
-
Security Concepts (Subspacefield)
This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.
-
Security+ Essentials (Neil Smyth)
This book is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ examination. It is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.
-
Open Source Security Tools: A Practical Guide to Security Apps
This book is a practical, hands-on introduction to open source security tools. It reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the "best of breed" for all major areas of information security.
-
Security Engineering: Building Dependable Distributed Systems
It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.
:
|
|