| 000 | 01852cam a2200301 i 4500 | ||
|---|---|---|---|
| 001 | 18711234 | ||
| 005 | 20170326085156.0 | ||
| 008 | 150722t20172017maua b 001 0 eng | ||
| 010 | _a2015028823 | ||
| 020 | _a9781284090659 | ||
| 020 | _a1284090655 | ||
| 040 |
_aRiNAUS _beng |
||
| 082 | 0 | 4 |
_a005.8 _223 _bJ M S |
| 100 | 1 | _aJang, Michael H. | |
| 245 | 1 | 0 |
_aSecurity strategies in Linux platforms and applications / _cMichael Jang and Ric Messier. |
| 250 | _aSecond edition. | ||
| 300 |
_axxiii, 514 pages : _billustrations ; _c23 cm |
||
| 490 | 0 | _aJones & Bartlett Learning information systems security & assurance series | |
| 500 | _aISC-2017 | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aSecurity threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies. | |
| 520 | _a"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"-- | ||
| 630 | 0 | 0 | _aLinux. |
| 650 | 0 | _aOperating systems (Computers) | |
| 650 | 0 | _aComputer security. | |
| 700 | 1 | _aMessier, Ric. | |
| 942 |
_2ddc _cBK |
||
| 999 |
_c25394 _d25393 |
||