Linux Security Books







 
OSgram.com   >   Shopping   >   Books   >   Linux Security
Shop for books about Linux and open source security issues and vulnerabilities.

Other web sites about Linux Security:Additional pages on this web site, which may be of interest: Here are some books about Linux and open source security issues and vulnerabilities:

Disclosure: Products details and descriptions provided by Amazon.com. Our company may receive a payment if you purchase products from them after following a link from this website.

How Linux Works, 2nd Edition: What Every Superuser Should Know

By Brian Ward

imusti
Released: 2014-11-14
Paperback (392 pages)

How Linux Works, 2nd Edition: What Every Superuser Should Know
List Price: $39.95*
Lowest New Price: $22.95*
Lowest Used Price: $17.59*
Usually ships in 24 hours*
*(As of 05:39 Pacific 16 Jul 2019 More Info)


Click Here
  • No Starch Press
Product Description:
Unlike some operating systems, Linux doesn’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.

In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you’ll find the kind of knowledge that normally comes from years of experience doing things the hard way. You’ll learn:
–How Linux boots, from boot loaders to init implementations (systemd, Upstart, and System V)
–How the kernel manages devices, device drivers, and processes
–How networking, interfaces, firewalls, and servers work
–How development tools work and relate to shared libraries
–How to write effective shell scripts

You’ll also explore the kernel and examine key system tasks inside user space, including system calls, input and output, and filesystems. With its combination of background, theory, real-world examples, and patient explanations, How Linux Works will teach you what you need to know to solve pesky problems and take control of your operating system.

UNIX and Linux System Administration Handbook (5th Edition)

By Evi Nemeth, Trent R. Hein & Dan Mackin

Addison-Wesley Professional
Paperback (1232 pages)

UNIX and Linux System Administration Handbook (5th Edition)
List Price: $69.99*
Lowest New Price: $45.99*
Lowest Used Price: $41.95*
Usually ships in 24 hours*
*(As of 05:39 Pacific 16 Jul 2019 More Info)


Click Here
Product Description:

“As an author, editor, and publisher, I never paid much attention to the competition—except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against.”

—Tim O’Reilly, founder of O’Reilly Media

 

“This edition is for those whose systems live in the cloud or in virtualized data centers; those whose administrative work largely takes the form of automation and configuration source code; those who collaborate closely with developers, network engineers, compliance officers, and all the other worker bees who inhabit the modern hive.”

—Paul Vixie, Internet Hall of Fame-recognized innovator and founder of ISC and Farsight Security

 

“This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems’ history but doesn’t bloviate. It’s just straight-forward information delivered in a colorful and memorable fashion.”

—Jason A. Nunnelley

 

UNIX and Linux System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.

 

Updated for new distributions and cloud environments, this comprehensive guide covers best practices for every facet of system administration, including storage management, network design and administration, security, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and the management of IT service organizations. The authors—world-class, hands-on technologists—offer indispensable new coverage of cloud platforms, the DevOps philosophy, continuous deployment, containerization, monitoring, and many other essential topics.

 

Whatever your role in running systems and networks built on UNIX or Linux, this conversational, well-written ¿guide will improve your efficiency and help solve your knottiest problems.

Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition

By Tajinder Kalsi

Packt Publishing
Released: 2018-08-31
Paperback (482 pages)

Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition
List Price: $44.99*
Lowest New Price: $44.99*
Lowest Used Price: $56.81*
Usually ships in 24 hours*
*(As of 05:39 Pacific 16 Jul 2019 More Info)


Click Here
Product Description:

Enhance file system security and learn about network attack, security tools and different versions of Linux build.

Key Features

  • Hands-on recipes to create and administer a secure Linux system
  • Enhance file system security and local and remote user authentication
  • Use various security tools and different versions of Linux for different tasks

Book Description

Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security flaws, and these security flaws allow attackers to get into your system and modify or even destroy your important data. But there’s no need to panic, since there are various mechanisms by which these flaws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system.

With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux.

By the end of this book, you will be able to secure your Linux systems and create a robust environment.

What you will learn

  • Learn about vulnerabilities and exploits in relation to Linux systems
  • Configure and build a secure kernel and test it
  • Learn about file permissions and how to securely modify files
  • Authenticate users remotely and securely copy files on remote systems
  • Review different network security methods and tools
  • Perform vulnerability scanning on Linux machines using tools
  • Learn about malware scanning and read through logs

Who this book is for

This book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily.

Table of Contents

  1. Linux Security Problem
  2. Configuring a Secure and Optimized Kernel
  3. Local Filesystem Security
  4. Local Authentication in Linux
  5. Remote Authentication
  6. Network Security
  7. Security Tools
  8. Linux Security Distros
  9. Bash Vulnerability Patching
  10. Security Monitoring and Logging
  11. Understanding Linux Service Security
  12. Scanning & Auditing Linux
  13. Vulnerability Scanning & Intrusion Detection

Hardening Linux

By James Turnbull

Brand: Apress
Paperback (584 pages)

Hardening Linux
List Price: $49.99*
Lowest New Price: $14.66*
Lowest Used Price: $8.17*
Usually ships in 24 hours*
*(As of 05:39 Pacific 16 Jul 2019 More Info)


Click Here
  • Used Book in Good Condition
Product Description:
*Imparts good security doctrine, methodology, and strategies

*Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application.

*Offers users a selection of resources (websites, mailing lists, and books) to further their knowledge.

Linux Essentials for Cybersecurity (Pearson IT Cybersecurity Curriculum (ITCC))

By William Rothwell

Pearson IT Certification
Released: 2018-07-30
Paperback (704 pages)

Linux Essentials for Cybersecurity (Pearson IT Cybersecurity Curriculum (ITCC))
List Price: $80.00*
Lowest New Price: $74.57*
Lowest Used Price: $69.02*
Usually ships in 24 hours*
*(As of 05:39 Pacific 16 Jul 2019 More Info)


Click Here
Product Description:

ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK


From the basics to advanced techniques: no Linux security experience necessary
Realistic examples & step-by-step activities: practice hands-on without costly equipment
The perfect introduction to Linux-based security for all students and IT professionals


Linux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.


Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William “Bo” Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.


First, you’ll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, you’ll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, you’ll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.


To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.


LEARN HOW TO:


  • Review Linux operating system components from the standpoint of security
  • Master key commands, tools, and skills for securing Linux systems
  • Troubleshoot common Linux security problems, one step at a time
  • Protect user and group accounts with Pluggable Authentication
  • Modules (PAM), SELinux, passwords, and policies
  • Safeguard files and directories with permissions and attributes
  • Create, manage, and protect storage devices: both local and networked
  • Automate system security 24/7 by writing and scheduling scripts
  • Maintain network services, encrypt network connections, and secure network-accessible processes
  • Examine which processes are running–and which may represent a threat
  • Use system logs to pinpoint potential vulnerabilities
  • Keep Linux up-to-date with Red Hat or Debian software management tools
  • Modify boot processes to harden security
  • Master advanced techniques for gathering system information

  RADMIN: fast, secure, affordable. Free Trial.


 
     
Shopping
 
  Books
   Apache
   BSD
   Eclipse
   Firefox
   GIMP
   GNOME
   GNU
   JBoss
   Linux
   MySQL
   OpenOffice
   Open Source
   Perl
   PHP
   PostgreSQL
   Python
   Ruby
   Security
   Solaris
   SQLite

  Clothing

  Magazines

  Software
 

ATI Echo Server for Linux

News Resources
 
  Companies

  Conferences

  Embedded

  Mobile

  Patents

  Security

  Software

  VoIP
 


 
   
Contact Us   Privacy   Terms Of Use   Advertising/Endorsements Disclosures

Copyright © 2006-2018, Answers 2000 Limited.

Answers 2000 Limited has no opinion about any stories or content of, or views expressed in, any linked news resource or website. Information about companies, organizations, products and services was believed to be correct at the time it was first published on this website, but may out of date by the time you read this website. For current information about any company or organization, readers are advised to check with the applicable company or organization.

Answers 2000 Limited expresses no opinion about any company or organization (including expressing no opinion on any investments in, with, or relating to, any company or organization), product or service. This website is not intended as investment or financial advice.

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.
CERTAIN CONTENT THAT APPEARS ON THIS SITE,COMES FROM AMAZON EU S. r.l. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.

In Association With Amazon.com
Answers 2000 Limited is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.
In Association With Amazon.co.uk
Answers 2000 Limited is a participant in the Amazon EU Associates Programme, an affiliate advertising programme designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.co.uk.
As an Amazon Associate, our company earns from qualifying purchases. Amazon, the Amazon logo, Endless, and the Endless logo are trademarks of Amazon.com, Inc. or its affiliates.

Disclosure: Our company's websites' content (including this website's content) includes advertisements for our own company's websites, products, and services, and for other organization's websites, products, and services. In the case of links to other organization's websites, our company may receive a payment, (1) if you purchase products or services, or (2) if you sign-up for third party offers, after following links from this website. Unless specifically otherwise stated, information about other organization's products and services, is based on information provided by that organization, the product/service vendor, and/or publicly available information - and should not be taken to mean that we have used the product/service in question. Additionally, our company's websites contain some adverts which we are paid to display, but whose content is not selected by us, such as Google AdSense ads. For more detailed information, please see Advertising/Endorsements Disclosures

Our sites use cookies, some of which may already be set on your computer. Use of our site constitutes consent for this. For details, please see Privacy.

Click privacy for information about our company's privacy, data collection and data retention policies, and your rights.