| 000 | 01685 a2200253 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20221018132419.0 | ||
| 010 | _a 2011281105 | ||
| 020 | _a076379189X | ||
| 020 | _a9780763791896 | ||
| 035 | _a(OCoLC)ocn650217966 | ||
| 040 | _cNust | ||
| 082 | 0 | 0 | _a005.8,JAN |
| 100 | 1 |
_aJang, Michael H. _9100623 |
|
| 245 | 1 | 0 |
_aSecurity strategies in Linux platforms and applications / _cMichael Jang. |
| 260 |
_aSudbury, MA : _bJones & Bartlett Learning, _cc2011. |
||
| 300 |
_axxiii, 509 p. : _bill. ; _c24 cm. |
||
| 490 | 1 | _aJones & Bartlett Learning information systems security & assurance series | |
| 505 | _aONE. Is Linux Really Secure? (Page-1), Security Threats to Linux(Page-2), Basic Components of Linux Security(Page-28), TWO. Layered Security and Linux(Page-53), Basic Security: Facilities Through the Boot Process(Page-54), User Privileges and Permissions(Page-83), Filesystems, Volumes, and Encryption(Page-114), Every Service Is a Potential Risk(Page-146), Networks, Firewalls, and More(Page-176), Networked File systems and Remote Access(Page-218), Networked Application Security(Page-251), Kernel Security Risk Mitigation(Page-283),THREE. Building a Layered Linux Security Strategy(Page-315), Managing Security Alerts and Updates(Page-316), Building and Maintaining a Security Baseline(Page-352), Testing and Reporting(Page-378), Detecting and Responding to Security Breaches(Page-418), Best Practices and Emerging Technologies(Page-446). | ||
| 650 | 0 |
_aComputer security. _9570 |
|
| 650 | 0 | _aOperating systems (Computers) | |
| 830 | 0 |
_aJones & Bartlett Learning information systems security & assurance series. _995180 |
|
| 942 |
_cBK _2ddc _k005.8,JAN |
||
| 999 |
_c219419 _d219419 |
||