Index
 
Operating Systems
Linux
Unix
Solaris
Windows
Mac OS X
Embedded & RT
Theory Books
Java
Programming Languages
Hardware
Microsoft Technologies
Computer Science
Database
Network
Software Engineering
XML and XSL
Internet
Web Programming
Web Technologies
Physics
Bio-Chemistry
Mathematics
Medical
Redbooks
Unlisted/Miscellaneous

Contact Us

Freebookzone.com | What's New | Missing Link | Feedback

GNU/Linux OS



Book Title : Linux Security for Beginners
eBook download format(s) : html
Author(s) : Neil A. Smyth
Section : GNU/Linux OS
Book Review:

Book Description
There is a saying in the security world that the only truly safe computer system is one that is disconnected from the network, switched off and buried six feet under ground. The sentiment may be somewhat true but it is hardly a practical solution to the problems we face today in protecting servers and desktops from outside intrusion.

There are more computer systems connected to the internet either directly or via local area networks than at any time in the history of technology and the numbers are growing at a rapid rate. It seems that not a month goes by without another story in the news about the internal network of a major corporation being compromised by an intruder.

Fortunately all is not lost and we do not have to pull the network cables out of the back of our computer systems. With careful planning and system configuration it is quite possible to create a secure environment that will cause the hacker to move on to the next, easier target without rendering the entire system useless.

Why Linux ?

This book is designed to provide an overview of the steps needed to implement a secure environment on a Linux system and outlines some of the threats and how these weaknesses are exploited by what have come to be commonly called 'hackers'.

Linux users have some inherent advantages over their fellow Windows users when it comes to security. Linux is both more secure and less common than Windows based systems with the consequence that attacks on Linux systems occur less frequently than on Windows systems. Having said that it would be foolish to be complacent about securing any system regardless of whether it runs Windows, Linux or any other operating system.

The purpose of this book is to provide a step by step approach to securing a Linux system from outside attack. It is designed to be used and understood by both new and experienced Linux users.




add to del.icio.us                 Digg Freebookzone.com!

You may use anyone of the download options


eBook VersionLook @ Amazon
Front Cover

Missing Link?, Report It and you may wish to find Similar Books from amazon.

Tell a Friend!

Similar Book titles in GNU/Linux OS section:
The Linux Cookbook - Tips and Techniques for Everyday Use
Linux IP Networking
The Linux Programmer's Guide
Introduction to Linux
Linux Professional Institute Certification (LPIC) Level 2 Examination Preparation
Linux From Scratch
Linux Kernel 2.4 Internals
Linux Device Drivers, 3rd Edition
Linux Newbie Administrator Guide
The Linux Web Server CD Bookshelf
Brian and Tom's Linux Book
Advanced Linux Programming
Learning Debian GNU/Linux
Slackware Linux Unleashed
Linux User's Guide
Security in Open Systems
Linux Installation and Getting Started
LINUX: Rute User's Tutorial and Exposition
RHCE Red Hat Certified Engineer Linux Study Guide (Exam RH302), Fourth Edition
The Linux Administrator's Security Guide
Linux Configuration and Installation
The Linux Kernel
Understanding the Linux Kernel, 2nd Edition
Secure Programming for Linux and Unix
Josh's GNU/Linux Guide
Debian GNU/Linux System Administrator's Manual
The Linux Kernel Module Programming Guide 2.6
The Linux Kernel Module Programming Guide 2.4
Securing and Optimizing Linux: Red Hat Edition
Programming Guide for Linux USB Device Drivers
Redhat Linux Unleashed
Linux System Administrator's Survival Guide
Linux Network Administrator's Guide
Linux From Scratch (Current Development)
Linux RedHat Cluster Manager Installation Administration Guide
Linux in the Workplace - How to Use Linux in Your Office
Teach yourself Linux in 24 hours
Get Acquainted with Linux Security and Optimization System
The Linux Kernel Hackers' Guide
The Linux System Administrators' Guide
The Linux Administration Made Easy (LAME)
Linux + Windows HOWTO
The Easiest Linux Guide You'll Ever Read - an Introduction to Linux for Windows Users
Programming Linux Games
Debian GNU/Linux: Guide to Installation and Usage
Beyond Linux from Scratch
The Linux Kernel: Blueprints for World Domination
Agustin's Linux Manual
The Linux Documentation Project (LDP)
The Linux+FreeBSD mini-HOWTO
Debian GNU/Linux Desktop Survival Guide
Iptables Tutorial 1.2.2 - Linux Firewall Configuration
Slackware Linux Essentials, Second Edition
Slackware Linux Basics - For Slackware Linux 10.2
Ubuntu Linux Essentials
Fedora Linux Essentials
Linux Kernel in a Nutshell
GNU/Linux Networking Tutorial for Newbies
Linux Quick Fix Notebook
Understanding the Linux Virtual Memory Manager
Building Applications with the Linux Standard Base
Self-Service Linux - Mastering the Art of Problem Determination
Guide to ARMLinux for Developers


Similar Book titles in Other sections:

Section: Photography
Beginners Guide to B W Photography


Section: Computer Hardware
Hardware Guide to Linux: A Collection of Linux HOW-TO
Upgrading and Repairing PCs, Linux Edition (Upgrading & Repairing)


Section: Device Drivers
Linux Device Drivers, 2nd Edition
Writing a Linux device driver


Section: Internet
Practical UNIX & Internet Security
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Computer Security Basics 2nd Edition
Writing Security Tools And Exploits
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
Show all..


Section: Java Language
Java Programming on Linux
Java Application Development on Linux


Section: Java Networking
JAVA 2 Network Security


Section: Miscellaneous
Handbook of Information Security Management


Section: Microsoft .(dot) net
The .NET Developer's Guide to Windows Security
Improving Web Application Security: Threats and Countermeasures


Section: Networking
Introduction to Computer, Internet & Network Systems Security
Linux Network Administrator's Guide (2nd Edition)
Linux: A Network Solution for Your Office
Cisco - Designing Network Security
Cisco Secure Internet Security Solutions
Show all..


Section: Novels
The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary


Section: Mac OS X
Maximum Mac OS X Security


Section: Embedded and RTOS
Building Embedded Linux Systems


Section: Assembly Language
Linux Assembly HOW-TO
Linux Assembly
Linux System Calls for Assembly Language Programmers
Linux Device Drivers in Assembly Language
Machine Language For Beginners
Show all..


Section: C++ Language
A Beginners C++
Tom Swan's GNU C++ for Linux (Professional Dev. Guide)


Section: Other Programming
The Big Online Book of Linux Ada Programming


Section: Scripting
The Linux Tcl and Tk HOWTO


Section: Redbooks Draft
IBM Workplace Managed Client 2.6 on Linux
Using DCSS/XIP with Oracle 10g on Linux for System z
Using DCSS/XIP with Orace 10g on Linux for System z
z/VM and Linux on IBM System z: The Virtualization Cookbook for Red Hat Enterprise Linux 4
Linux Client Migration Cookbook, Version 2 A Practical Planning and Implementation Guide for Migrating to Desktop Linux
Show all..


Section: Redbooks
Security Considerations in Notes and Domino 7: Making Great Security Easier to Implement
Aix and Linux Interoperabilty
Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 4: Policy-Based Network Security
Enterprise Security Architecture Using IBM Tivoli Security Solutions
Security for Linux on System z
Show all..


Section: IBM Technotes
VIOS Network Install from Linux Server


Section: Redpapers
Installing and Using MPICH, MPICH-GM, and MPICH-MX on Linux Systems
WebSphere Portal Server for Linux on zSeries and z9
WebSphere Application Server on z/OS and Security Integration
Security with IBM Tivoli Access Manager V6 and IBM WebSphere Application Server V6 on IBM z/OS
J2C Security on z/OS
Show all..


Section: Redpapers Draft
Techniques to Build a Diskless Boot Linux Cluster of JS21 Blades
Domino 7 on Linux for IBM System z: Capacity Planning and Performance Updates
Managing Linux Guests using IBM Director and z/VM Center
Improving your WebApplication Software Development Life Cycle's Security Posture with IBM Rational AppScan
Linux Performance and Tuning Guidelines
Show all..


Section: Software Engineering
Free For All: How Linux and the Free Software Movement Undercut the High-Tech Titans


Similar Books from Amazon :


Tell a Friend!


©2008 FreeBookZone.com - Home - Privacy Policy - Program Policy, Terms and Conditions