Sometimes your system might fail to boot due to changes within the kernel. Hence it is important that when creating reports about these failures, all the appropriate information about debugging is included. This will be useful for the kernel team in resolving the issue.
-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Practical Linux Security Cookbook
By :

Practical Linux Security Cookbook
By:
Overview of this book
Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security ?aws, and these security ?aws allow attackers to get into your system and modify or even destroy your important data. But there’s no need to panic, since there are various mechanisms by which these ?aws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system.
With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux.
By the end of this book, you will be able to secure your Linux systems and create a robust environment.
Table of Contents (15 chapters)
Preface
In Progress
| 0 / 6 sections completed |
0%
Linux Security Problem
In Progress
| 0 / 11 sections completed |
0%
Configuring a Secure and Optimized Kernel
In Progress
| 0 / 9 sections completed |
0%
Local Filesystem Security
In Progress
| 0 / 9 sections completed |
0%
Local Authentication in Linux
In Progress
| 0 / 8 sections completed |
0%
Remote Authentication
In Progress
| 0 / 7 sections completed |
0%
Network Security
In Progress
| 0 / 9 sections completed |
0%
Security Tools
In Progress
| 0 / 10 sections completed |
0%
Linux Security Distros
In Progress
| 0 / 8 sections completed |
0%
Bash Vulnerability Patching
In Progress
| 0 / 6 sections completed |
0%
Security Monitoring and Logging
In Progress
| 0 / 12 sections completed |
0%
Understanding Linux Service Security
In Progress
| 0 / 6 sections completed |
0%
Scanning and Auditing Linux
In Progress
| 0 / 7 sections completed |
0%
Vulnerability Scanning and Intrusion Detection
In Progress
| 0 / 5 sections completed |
0%
Other Books You May Enjoy
In Progress
| 0 / 2 sections completed |
0%
Customer Reviews