000 01852cam a2200301 i 4500
001 18711234
005 20170326085156.0
008 150722t20172017maua b 001 0 eng
010 _a2015028823
020 _a9781284090659
020 _a1284090655
040 _aRiNAUS
_beng
082 0 4 _a005.8
_223
_bJ M S
100 1 _aJang, Michael H.
245 1 0 _aSecurity strategies in Linux platforms and applications /
_cMichael Jang and Ric Messier.
250 _aSecond edition.
300 _axxiii, 514 pages :
_billustrations ;
_c23 cm
490 0 _aJones & Bartlett Learning information systems security & assurance series
500 _aISC-2017
504 _aIncludes bibliographical references and index.
505 0 _aSecurity threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
520 _a"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"--
630 0 0 _aLinux.
650 0 _aOperating systems (Computers)
650 0 _aComputer security.
700 1 _aMessier, Ric.
942 _2ddc
_cBK
999 _c25394
_d25393