9780763791896-076379189X-Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)

Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance)

ISBN-13: 9780763791896
ISBN-10: 076379189X
Edition: Security ed.
Author: Michael Jang
Publication date: 2010
Publisher: Jones & Bartlett Learning
Format: Paperback 512 pages
FREE US shipping on ALL non-marketplace orders
Marketplace
from $6.00 USD
Buy

From $6.00

Book details

ISBN-13: 9780763791896
ISBN-10: 076379189X
Edition: Security ed.
Author: Michael Jang
Publication date: 2010
Publisher: Jones & Bartlett Learning
Format: Paperback 512 pages

Summary

Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance) (ISBN-13: 9780763791896 and ISBN-10: 076379189X), written by authors Michael Jang, was published by Jones & Bartlett Learning in 2010. With an overall rating of 4.2 stars, it's a notable title among other Network Administration (Network Security, Security & Encryption, Networking & Cloud Computing) books. You can easily purchase or rent Security Strategies in Linux Platforms and Applications (Information Systems Security & Assurance) (Paperback) from BooksRun, along with many other new and used Network Administration books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.41.

Description

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!

Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion on the risks, threats, and vulnerabilities associated with Linux as an operating system using examples from Red Hat Enterprise Linux and Ubuntu. Part 2 discusses how to take advantage of the layers of security available to Linux―user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk students through the fundamentals of security strategies related to the Linux system.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book