With all-new coverage of home, mobile, and wireless issues, migrating from IP chains to IP tables, and protecting your network from users as well as hackers, this book provides immediate and effective Intrusion Detection System techniques. Contains practical solutions for every system administrator working with any Linux system, large or small.
A controversial, comprehensive guide to Linux security--written by the same anonymous hacker who wrote the bestselling "Maximum Security." The book covers hundreds of Linux system holes, attack methods, hacker's tools, and security techniques. The CD-ROM includes a comprehensive collection of Linux security products, plus code examples, technical documents,
Develop the skills you need in the real world Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at Linux administration, with key information organized around the actual day-to-day tasks, scenarios, and challenges you'll face in the field. This valuable training tool is loaded with hands-on, step-by-step exercises covering all phases of Linux administration, including: * Working on the command line * Configuring hardware and the kernel * Managing software and processes * Documenting the system * Working with partitions and file systems * Configuring network features * Managing security An invaluable study tool This no-nonsense book also maps to the common tasks and exam objectives for the Linux Professional Institute (LPI) LPIC-1 certification exam and CompTIA's Linux+ certification exam. So whether you're preparing for certification or seeking practical skills to break into the field, you'll find the instruction you need, such as: * Using the command shell history * Redirecting input and output * Resolving hardware conflicts * Reconfiguring the login screen * Managing RPM and Debian packages * Protecting your system from runaway processes * Monitoring your system for degraded performance and security problems * Using journaling filesystems * Configuring common server software The Street Smarts Series is designed to help current or aspiring IT professionals put their certification to work for them. Full of practical, real world scenarios, each book features actual tasks from the field and then offers step-by-step exercises that teach the skills necessary to complete those tasks. And because the exercises are based upon exam objectives from leading technology certifications, each Street Smarts book can be used as a lab manual for certification prep.
"The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered sec
Summary Linux in Action is a task-based tutorial that will give you the skills and deep understanding you need to administer a Linux-based system. This hands-on book guides you through 12 real-world projects so you can practice as you learn. Each chapter ends with a review of best practices, new terms, and exercises. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology You can't learn anything without getting your hands dirty including Linux. Skills like securing files, folders, and servers, safely installing patches and applications, and managing a network are required for any serious user, including developers, administrators, and DevOps professionals. With this hands-on tutorial, you'll roll up your sleeves and learn Linux project by project. About the Book Linux in Action guides you through 12 real-world projects, including automating a backup-and-restore system, setting up a private Dropbox-style file cloud, and building your own MediaWiki server. You'll try out interesting examples as you lock in core practices like virtualization, disaster recovery, security, backup, DevOps, and system troubleshooting. Each chapter ends with a review of best practices, new terms, and exercises. What's inside Setting up a safe Linux environment Managing secure remote connectivity Building a system recovery device Patching and upgrading your system About the Reader No prior Linux admin experience is required. About the Author David Clinton is a certified Linux Server Professional, seasoned instructor, and author of Manning's bestselling Learn Amazon Web Services in a Month of Lunches. Table of Contents Welcome to Linux Linux virtualization: Building a Linux working environment Remote connectivity: Safely accessing networked machines Archive management: Backing up or copying entire file systems Automated administration: Configuring automated offsite backups Emergency tools: Building a system recovery device Web servers: Building a MediaWiki server Networked file sharing: Building a Nextcloud file-sharing server Securing your web server Securing network connections: Creating a VPN or DMZ System monitoring: Working with log files Sharing data over a private network Troubleshooting system performance issues Troubleshooting network issues Troubleshooting peripheral devices DevOps tools: Deploying a scripted server environment using Ansible
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes: Precise directions for securing common services, including the Web, mail, DNS, and file transfer. Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling. Basic installation of intrusion detection tools. Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as key services such as DNS, the Apache Web server, mail, file transfer, and secure shell. With this book in hand, you'll have everything you need to ensure robust security of your Linux system.
This guide provides a solid background for Linux desktop users who want to move beyond the basics of Linux, and for experienced system administrators who are looking to gain more advanced skills.
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades. However, security has always been a major concern. With limited resources available in the Linux security domain, this book will be an invaluable guide in helping you get your Linux systems properly secured. Complete with in-depth explanations of essential concepts, practical examples, and self-assessment questions, this book begins by helping you set up a practice lab environment and takes you through the core functionalities of securing Linux. You'll practice various Linux hardening techniques and advance to setting up a locked-down Linux server. As you progress, you will also learn how to create user accounts with appropriate privilege levels, protect sensitive data by setting permissions and encryption, and configure a firewall. The book will help you set up mandatory access control, system auditing, security profiles, and kernel hardening, and finally cover best practices and troubleshooting techniques to secure your Linux environment efficiently. By the end of this Linux security book, you will be able to confidently set up a Linux server that will be much harder for malicious actors to compromise.What you will learn Create locked-down user accounts with strong passwords Configure firewalls with iptables, UFW, nftables, and firewalld Protect your data with different encryption technologies Harden the secure shell service to prevent security break-ins Use mandatory access control to protect against system exploits Harden kernel parameters and set up a kernel-level auditing system Apply OpenSCAP security profiles and set up intrusion detection Configure securely the GRUB 2 bootloader and BIOS/UEFI Who this book is for This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.
Are you ready to take charge of fortifying your Linux systems against the relentless tide of cyber threats? "Mastering Linux Security" is your comprehensive guide to mastering the art of securing Linux environments against a spectrum of digital dangers. Whether you're an IT professional guarding critical servers or a Linux enthusiast striving to bolster personal security, this book equips you with the knowledge and tools to establish an unyielding defense. Key Features: 1. Thorough Exploration of Linux Security: Dive deep into the core principles of Linux security, understanding the intricacies of user management, permissions, and cryptography. Develop a solid foundation that empowers you to create a secure infrastructure. 2. Understanding Cyber Threats: Navigate the dynamic landscape of cyber threats. Learn about malware, exploits, social engineering attacks, and more, enabling you to stay ahead of adversaries and safeguard your systems effectively. 3. Hardening Linux Systems: Discover strategies for hardening Linux systems to reduce vulnerabilities. Implement best practices for securing SSH, firewalls, intrusion detection systems, and more to create a robust barrier. 4. Access Control and Identity Management: Delve into access control mechanisms and identity management strategies. Learn how to implement least privilege principles, multi-factor authentication, and centralized user management for enhanced security. 5. Network Security Measures: Master network security measures to shield Linux systems from cyber threats. Explore techniques for implementing firewalls, intrusion detection and prevention systems, and securing network services. 6. Secure Software Development: Learn how to develop secure software for Linux systems. Explore techniques for mitigating common vulnerabilities, implementing secure coding practices, and performing code audits. 7. Incident Response and Recovery: Develop a comprehensive incident response plan to handle security breaches effectively. Understand the steps for isolating threats, recovering compromised systems, and learning from security incidents. 8. Data Protection and Encryption: Uncover the world of data protection and encryption techniques on Linux. Implement secure storage, encryption, and secure data transmission methods to safeguard sensitive information. 9. Cloud Security Considerations: Navigate the complexities of securing Linux systems in cloud environments. Understand the unique challenges and solutions associated with Linux security in cloud settings. Who This Book Is For: "Mastering Linux Security" is an invaluable resource for IT professionals, system administrators, security analysts, and Linux enthusiasts tasked with protecting Linux systems from cyber threats. Whether you're well-versed in cybersecurity or a novice exploring the world of Linux security, this book will guide you through the complexities and empower you to establish an impregnable defense.
A unique, practical resource goes beyond the "how to install Linux" books to detail ways that people and businesses can solve real-world problems with free, open source software. The authors present a series of real-world business computing situations, both for the home and business user, and then tell what Linux and free software provides to solve the problem.