Logo

Linux Administrator's Security Guide

Small book cover: Linux Administrator's Security Guide

Linux Administrator's Security Guide
by

Publisher: Linuxtopia

Description:
Table of Contents: Introduction to computer security, Linux installation, physical and console security, Linux administration, backup guide, Linux file system and file security, user authentication, Linux system and user logging, attack detection, testing the security of your Linux system, firewalling overview, network security, software management, encryption, limiting and monitoring users, viruses, Linux VPN overview, kernel security, Linux security resources.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Guide to IP Layer Network Administration with LinuxGuide to IP Layer Network Administration with Linux
by
This guide provides an overview of many of the tools available for IP network administration of the linux operating system. It covers Ethernet, ARP, IP routing, NAT, and other topics central to the management of IP networks.
(10109 views)
Book cover: LINUX: Rute User's Tutorial and ExpositionLINUX: Rute User's Tutorial and Exposition
by - Prentice Hall PTR
In-depth, real-world coverage of every key aspect of system administration: user management, security, networking, Internet services, package management, C programming, kernel compilation, hardware configuration, and much more.
(10948 views)
Book cover: SUSE Linux Administration GuideSUSE Linux Administration Guide
by - SUSE LINUX AG
This Guide provides background information about the way your SUSE LINUX operates. This book introduces Linux system administration basics such as file systems, kernels, boot processes, an Apache web server, and secure authentication.
(11190 views)
Book cover: Linux Filesystem HierarchyLinux Filesystem Hierarchy
by
This document outlines the set of requirements and guidelines for file and directory placement under the Linux operating system according to those of the FSSTND v2.3 final and also its actual implementation on an arbitrary system.
(9183 views)