000 01685 a2200253 4500
003 Nust
005 20221018132419.0
010 _a 2011281105
020 _a076379189X
020 _a9780763791896
035 _a(OCoLC)ocn650217966
040 _cNust
082 0 0 _a005.8,JAN
100 1 _aJang, Michael H.
_9100623
245 1 0 _aSecurity strategies in Linux platforms and applications /
_cMichael Jang.
260 _aSudbury, MA :
_bJones & Bartlett Learning,
_cc2011.
300 _axxiii, 509 p. :
_bill. ;
_c24 cm.
490 1 _aJones & Bartlett Learning information systems security & assurance series
505 _aONE. Is Linux Really Secure? (Page-1), Security Threats to Linux(Page-2), Basic Components of Linux Security(Page-28), TWO. Layered Security and Linux(Page-53), Basic Security: Facilities Through the Boot Process(Page-54), User Privileges and Permissions(Page-83), Filesystems, Volumes, and Encryption(Page-114), Every Service Is a Potential Risk(Page-146), Networks, Firewalls, and More(Page-176), Networked File systems and Remote Access(Page-218), Networked Application Security(Page-251), Kernel Security Risk Mitigation(Page-283),THREE. Building a Layered Linux Security Strategy(Page-315), Managing Security Alerts and Updates(Page-316), Building and Maintaining a Security Baseline(Page-352), Testing and Reporting(Page-378), Detecting and Responding to Security Breaches(Page-418), Best Practices and Emerging Technologies(Page-446).
650 0 _aComputer security.
_9570
650 0 _aOperating systems (Computers)
830 0 _aJones & Bartlett Learning information systems security & assurance series.
_995180
942 _cBK
_2ddc
_k005.8,JAN
999 _c219419
_d219419