Linux® hardening in hostile networks : server security from TLS to TOR / Kyle Rankin.
Series: Pearson open source software development seriesPublisher: Boston : Addison-Wesley, ©2018Description: xxi, 242 pages : illustrations ; 23 cmContent type:- text
- still image
- unmediated
- volume
- 9780134173269
- Server security from TLS to TOR
- TK5105.59 .R36 2018

Current library | Home library | Call number | Status | Barcode | |
---|---|---|---|---|---|
Alfaisal University On Shelf | Alfaisal University On Shelf | TK5105.59 .R36 2018 (Browse shelf(Opens below)) | Available | AU00000000013275 |
Browsing Alfaisal University shelves, Shelving location: On Shelf Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
TK5105.59 .M854 2022 Network security and cryptography second edition / | TK5105.59 .M966 2018 Investigating the Cyber Breach : | TK5105.59 .N3464 2017 New solutions for cybersecurity / | TK5105.59 .R36 2018 Linux® hardening in hostile networks : | TK5105.59 .R54 2004 Network perimeter security : | TK5105.59 .R6733 2021 Comptia CySA+ cybersecurity analyst certification passport (exam cs0-002) / | TK5105.59 .R685 2018 Digital resilience : |
Includes index.
"In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods - especially if you're responsible for Internet-facing services. In Linux Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time. Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious, but now essential to mainstream Linux security. He also includes a full chapter on effective incident response. Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn't protect against, and whether it would be useful in your environment."--Provided by publisher.