Security strategies in Linux platforms and applications /

Saved in:
Bibliographic Details
Main Author: Jang, Michael H. (autor)
Format: Book
Language: English
Published: Sudbury, Massachusetts : Jones & Bartlett Learning, ©2011.
Series: Jones & Bartlett Learning information systems security & assurance series
Subjects:
Notas Contenido:
  • Security threats to Linux
  • Basic components of Linux security
  • Basic security: facilities through the boot process
  • user privileges and permissions
  • Filesystems, volumes, and encryption
  • Every service is a potential Risk
  • Networks, firewalls, and more
  • Networked filesystems and Remote access
  • Networked Application security
  • Kernel Security Risk mitigation
  • Managing security alerts and updates
  • Building and maintaining a security baseline
  • Testing and reporting-- Detecting an responding to security breaches
  • Best practices and emerging technologies

MARC

LEADER 00000nam a2200000 a 4500
001 000096191
003 CO-BoSNA
005 20260109094549.0
008 180523s2011^^^^xxua^^^gr^^^^^001^0^eng^d
020 |a 9780763791896 
040 |a CO-BoSNA  |b spa 
082 0 4 |a 005.8  |b J336a  |2 23 
100 1 |a Jang, Michael H.  |e autor 
245 1 0 |a Security strategies in Linux platforms and applications /  |c Michael Jang. 
260 |a Sudbury, Massachusetts :  |b Jones & Bartlett Learning,  |c ©2011. 
300 |a xxiii, 509 páginas :  |b ilustraciones ;  |c 23 cm. 
490 0 |a Jones & Bartlett Learning information systems security & assurance series 
504 |a Incluye referencias bibliográficas e índice temático 
505 0 |a Security threats to Linux -- Basic components of Linux security -- Basic security: facilities through the boot process -- user privileges and permissions -- Filesystems, volumes, and encryption -- Every service is a potential Risk -- Networks, firewalls, and more -- Networked filesystems and Remote access -- Networked Application security -- Kernel Security Risk mitigation -- Managing security alerts and updates -- Building and maintaining a security baseline -- Testing and reporting-- Detecting an responding to security breaches -- Best practices and emerging technologies 
650 1 7 |a Seguridad en computadores  |2 Armarc 
650 2 7 |a Sistemas operacionales (Computadores)  |2 Armarc 
650 2 7 |a Linux (Programa para computador)  |2 Armarc 
952 |0 0  |1 0  |4 11  |6 EJ___1_000000000000000  |7 0  |8 GENER  |9 452657  |a 19221  |b 19221  |d 2018-05-23  |h 005.8 J336a  |i 68870  |l 0  |o Ej. 1  |p 199221002634  |r 2026-01-09 09:45:49  |w 2026-01-09  |y BOOK  |z Cra. 9 No. 71N-60, Popayán 
952 |0 0  |1 0  |4 11  |6 EJ___2_000000000000000  |7 0  |8 GENER  |9 452658  |a 19221  |b 19221  |d 2018-05-23  |h 005.8 J336a  |i 68870  |l 0  |o Ej. 2  |p 199221002635  |r 2026-01-09 09:45:49  |w 2026-01-09  |y BOOK  |z Cra. 9 No. 71N-60, Popayán 
999 |c 100123  |d 100123 
942 |6 005_800000000000000__J336A