| 000 | 02033cam a2200325 i 4500 | ||
|---|---|---|---|
| 999 |
_c29848 _d29848 |
||
| 003 | CUTN | ||
| 005 | 20190820154426.0 | ||
| 008 | 150722t20172017maua b 001 0 eng | ||
| 020 | _a9781284090659 | ||
| 020 | _a1284090655 | ||
| 041 | _aEnglish | ||
| 042 | _apcc | ||
| 082 | 0 | 0 |
_a005.8 _223 _bJAN |
| 100 | 1 | _aJang, Michael H. | |
| 245 | 1 | 0 |
_aSecurity strategies in Linux platforms and applications / _cMichael Jang and Ric Messier. |
| 250 | _aSecond edition. | ||
| 260 |
_aBurlington, MA : _bJones & Bartlett Learning, _c2017. |
||
| 300 |
_axxiii, 514 pages : _billustrations ; _c23 cm |
||
| 505 | 0 | _aSecurity threats to Linux -- Basic components of Linux security -- Basic security : facilities through the boot process -- User privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential risk -- Networks, firewalls, and more -- Networked filesystems and remote access -- Networked application security -- Kernel security risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting -- Detecting and responding to security breaches -- Best practices and emerging technologies. | |
| 520 | _a"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered security strategy"-- | ||
| 650 | 0 | _aOperating systems (Computers) | |
| 650 | 0 | _aComputer security. | |
| 700 | 1 | _aMessier, Ric. | |
| 942 |
_2ddc _cBOOKS |
||
| 490 | 0 | _aJones & Bartlett Learning information systems security & assurance series | |
| 504 | _aIncludes bibliographical references and index. | ||
| 630 | 0 | 0 | _aLinux. |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||