Filteri
close
Tip rezultata
Svi rezultati uključeni
keyboard_arrow_down
Kategorija
Sve kategorije
keyboard_arrow_down
Opseg cena (RSD)
Prikaži sve
keyboard_arrow_down
Od
RSD
Do
RSD
Sortiraj po
keyboard_arrow_down
Objavljeno u proteklih
keyboard_arrow_down
Sajtovi uključeni u pretragu
Svi sajtovi uključeni
keyboard_arrow_down

Pratite promene cene putem maila

  • Da bi dobijali obaveštenja o promeni cene potrebno je da kliknete Prati oglas dugme koje se nalazi na dnu svakog oglasa i unesete Vašu mail adresu.
1-1 od 1 rezultata

Broj oglasa

Prikaz

format_list_bulleted
view_stream
1-1 od 1
1-1 od 1 rezultata

Prikaz

format_list_bulleted
view_stream

Režim promene aktivan!

Upravo ste u režimu promene sačuvane pretrage za frazu .
Možete da promenite frazu ili filtere i sačuvate trenutno stanje

What You Will Learn Use various techniques to prevent intruders from accessing sensitive data Prevent intruders from planting malware, and detect whether malware has been planted Prevent insiders from accessing data that they aren’t authorized to access Do quick checks to see whether a computer is running network services that it doesn’t need to run Learn security techniques that are common to all Linux distros, and some that are distro-specific Book Description This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise. Authors Donald A. Tevault Donald A. Tevault—but you can call him Donnie—got involved with Linux way back in 2006, and has been working with it ever since. He holds the Linux Professional Institute Level 3—Security certification, and the GIAC Incident Handler certification. Donnie is a professional Linux trainer, and thanks to the magic of the internet, teaches Linux classes literally the world over from the comfort of his living room. Table of Contents Chapter 1: Running Linux in a Virtual Environment Chapter 2: Securing User Accounts Chapter 3: Securing Your Server with a Firewall Chapter 4: Encrypting and SSH Hardening Chapter 5: Mastering Discretionary Access Control Chapter 6: Access Control Lists and Shared Directory Management Chapter 7: Implementing Mandatory Access Control with SELinux and AppArmor Chapter 8: Scanning, Auditing, and Hardening Chapter 9: Vulnerability Scanning and Intrusion Detection Chapter 10: Security Tips and Tricks for the Busy Bee

Prikaži sve...
forward
Detaljnije
Nazad
Sačuvaj