000 02033cam a2200325 i 4500
999 _c29848
_d29848
003 CUTN
005 20190820154426.0
008 150722t20172017maua b 001 0 eng
020 _a9781284090659
020 _a1284090655
041 _aEnglish
042 _apcc
082 0 0 _a005.8
_223
_bJAN
100 1 _aJang, Michael H.
245 1 0 _aSecurity strategies in Linux platforms and applications /
_cMichael Jang and Ric Messier.
250 _aSecond edition.
260 _aBurlington, MA :
_bJones & Bartlett Learning,
_c2017.
300 _axxiii, 514 pages :
_billustrations ;
_c23 cm
505 0 _aSecurity threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies.
520 _a"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"--
650 0 _aOperating systems (Computers)
650 0 _aComputer security.
700 1 _aMessier, Ric.
942 _2ddc
_cBOOKS
490 0 _aJones & Bartlett Learning information systems security & assurance series
504 _aIncludes bibliographical references and index.
630 0 0 _aLinux.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg