Linux Security Books







 
OSgram.com   >   Shopping   >   Books   >   Linux Security
Shop for books about Linux and open source security issues and vulnerabilities.

Other web sites about Linux Security:Additional pages on this web site, which may be of interest: Here are some books about Linux and open source security issues and vulnerabilities:

Disclosure: Products details and descriptions provided by Amazon.com. Our company may receive a payment if you purchase products from them after following a link from this website.

Practical Linux Security Cookbook

By Tajinder Kalsi

Kalsi Tajinder
Released: 2016-04-29
Paperback (276 pages)

Practical Linux Security Cookbook
List Price: $44.99*
Lowest New Price: $44.97*
Lowest Used Price: $29.19*
Usually ships in 24 hours*
*(As of 07:26 Pacific 11 Dec 2017 More Info)


Click Here
  • Practical Linux Security Cookbook
Product Description:

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasks

Book Description

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system.

Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure.

With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security.

With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.

What you will learn

  • Learn about various vulnerabilities and exploits in relation to Linux systems
  • Configure and build a secure kernel and test it
  • Learn about file permissions and security and how to securely modify files
  • Explore various ways to authenticate local users while monitoring their activities.
  • Authenticate users remotely and securely copy files on remote systems
  • Review various network security methods including firewalls using iptables and TCP Wrapper
  • Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more
  • Understand Bash vulnerability/security and patch management

About the Author

Tajinder Kalsi is an innovative professional with more than 9 years of progressive experience within the information security industry. He has a good amount of knowledge and experience in web application testing, vulnerability assessment, network penetration testing, and risk assessment.

At present, he is working as an independent information security consultant. He started his career with Wipro as a technical associate, and later on he became an ISMS consultant cum technical evangelist. In his free time, he conducts seminars in colleges all across India on various topics, and he has covered more than 125 colleges and spoken to 10,000+ students.

In the past, he has reviewed books such as Web Application Penetration Testing with Kali Linux, Mastering Kali Linux for Advanced Penetration Testing, and Advanced Wireless Penetration Testing for Highly-Secured Environments.

You can find him on Facebook at www.facebook.com/tajinder.kalsi.tj, or contact him on his website at www.tajinderkalsi.com.

Table of Contents

  1. Linux Security Problems
  2. Configuring a Secure and Optimized Kernel
  3. Local Filesystem Security
  4. Local Authentication in Linux
  5. Remote Authentication
  6. Network Security
  7. Security Tools
  8. Linux Security Distros
  9. Patching a Bash Vulnerability
  10. Security Monitoring and Logging

Mastering Linux - Security

By Paul Cobbaut

Paul Cobbaut
Paperback (130 pages)

Mastering Linux - Security
List Price: $19.99*
Lowest New Price: $18.97*
Lowest Used Price: $18.91*
Usually ships in 24 hours*
*(As of 07:26 Pacific 11 Dec 2017 More Info)


Click Here
  • Mastering Linux Security
Product Description:
The Mastering Linux Series consisting of 6 books (Fundamentals, System Administration, Servers, Storage, Security, Networking) provides you with a solid foundation about the Linux Operating System. It abstracts from a particular distribution by giving you the background knowledge to easily work with any Linux distribution out there.

Rtfm: Red Team Field Manual

By Ben Clark

CreateSpace Independent Publishing Platform
Paperback (96 pages)

Rtfm: Red Team Field Manual
List Price: $10.00*
Lowest New Price: $9.00*
Lowest Used Price: $5.01*
Usually ships in 24 hours*
*(As of 07:26 Pacific 11 Dec 2017 More Info)


Click Here
Product Description:
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

  Virtual Private Server Hosting starting at $19


 
     
Shopping
 
  Books
   Apache
   BSD
   Eclipse
   Firefox
   GIMP
   GNOME
   GNU
   JBoss
   Linux
   MySQL
   OpenOffice
   Open Source
   Perl
   PHP
   PostgreSQL
   Python
   Ruby
   Security
   Solaris
   SQLite

  Clothing

  Magazines

  Software
 

ATI Echo Server for Linux

News Resources
 
  Companies

  Conferences

  Embedded

  Mobile

  Patents

  Security

  Software

  VoIP
 


 
   
Contact Us   Privacy   Terms Of Use   Advertising/Endorsements Disclosures

Copyright © 2006-2015, Answers 2000 Limited.

Answers 2000 Limited has no opinion about any stories or content of, or views expressed in, any linked news resource or website. Information about companies, organizations, products and services was believed to be correct at the time it was first published on this website, but may out of date by the time you read this website. For current information about any company or organization, readers are advised to check with the applicable company or organization.

Answers 2000 Limited expresses no opinion about any company or organization (including expressing no opinion on any investments in, with, or relating to, any company or organization), product or service. This website is not intended as investment or financial advice.

In Association With Amazon.com
Answers 2000 Limited is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED 'AS IS' AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.

Disclosure: Our company's websites' content (including this website's content) includes advertisements for our own company's websites, products, and services, and for other organization's websites, products, and services. In the case of links to other organization's websites, our company may receive a payment, (1) if you purchase products or services, or (2) if you sign-up for third party offers, after following links from this website. Unless specifically otherwise stated, information about other organization's products and services, is based on information provided by that organization, the product/service vendor, and/or publicly available information - and should not be taken to mean that we have used the product/service in question. Additionally, our company's websites contain some adverts which we are paid to display, but whose content is not selected by us, such as Google AdSense ads. For more detailed information, please see Advertising/Endorsements Disclosures

Our sites use cookies, some of which may already be set on your computer. Use of our site constitutes consent for this. For details, please see Privacy.