Nov 1, Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of. Hardening Linux has 34 ratings and 2 reviews. Hardening is the process of protecting a system and its applications against unknown threats. Hardening L. Hardening Linux. Author: James Turnbull. Publication: Cover Image. · Book. Hardening Linux View colleagues of James Turnbull. top of page REFERENCES.
|Published (Last):||13 July 2012|
|PDF File Size:||6.17 Mb|
|ePub File Size:||14.84 Mb|
|Price:||Free* [*Free Regsitration Required]|
Christian rated it really liked it Jul 15, The author starts the narration by explaining why and how one could make the boot-loader Grub or Hardening linux james turnbull more secure.
Highly recommended reading if you’re running a Linux box you wouldn’t want getting “0wn3d.
Blogger Templates by BTemplates. The second chapter takes an in depth look at configuring a firewall using iptables in Linux.
Jure rated it it was amazing Jul 06, Wade Johnson I was a bit surprised when I scanned the table of contents. Mohamed rated it it was ok Aug 10, This hardening linux james turnbull also goes into a detailed analysis of how one can install and configure Tripwire – a checksum and integrity scanner famed hardening linux james turnbull its robustness as well as cryptic configuration commands. The book is divided into 11 chapters and 3 appendices each covering a niche area related to security in Linux.
The first thought in my hardeening was, ‘hey, this has everything in it. Jovany Agathe rated it did not like it Feb 10, In the fifth chapter of this book, the author explains in detail the working and configuration of two popular logging daemons namely syslog and its more secure counterpart syslog-NG.
One can learn a lot by checking the logs generated by the various services running on it. Alex Le rated it it was amazing Jan 18, Here the author lays stress on configuring a firewall for bastion hosts – those jsmes which form the gateway between a trusted and untrusted network.
More specifically the vsftp server known for its security. David Escalante rated it liked it Dec 21, I was fascinated when I read a section which explains the use of the most popular password cracking tool available called John The Ripper to check the strength of the passwords used in the system. Crow Killer, New Edition: More so if there are servers running on one’s computer. Another excellent description is hardening linux james turnbull chapter on file system security.
He hardening linux james turnbull light on the various services that could be running on a default installation of Linux and explores which of them are hardening linux james turnbull and which could be stopped.
Books by James Turnbull. Hardening linux james turnbull Post Older Post Home. This book is not yet featured on Listopia. Show More Show Less. Hardening DNS and BIND form the last and final chapter of this well written book where the author explains the potential security issues faced by a DNS server such as man in the middle attack, cache poisoning, Tutnbull attack and data corruption and alteration.
Rather spontaneously, I decided to start with this security-focused title instead of the perhaps more intuitive path of installing the latest distro, setting up a bunch of daemons, installing databases, etc. Additional Details Number hardening linux james turnbull Volumes.
The next 3 chapters deal exclusively in securing a computer running a mail server.
Aug 18, Edward rated it it was ok. Harddning rated it liked it Apr 06, Jason Anderson rated it liked it Jan 15, Packaging should be the same as what is found in a retail store, unless the item is handmade or was packaged by the manufacturer in non-retail packaging, such as an unprinted box hardening linux james turnbull plastic bag. El James Paperback Books.
El James 1st Edition Paperback Books. I see your point, Rusty. Evelyn Dickinson rated it really liked it Sep 08, There is also a section which explains the steps to hardening linux james turnbull taken in the advent that a system gets compromised.
Open Preview See a Problem? Which Hardenihg usually print out Sarath Chandra rated it it was amazing Apr 19, But as with any OS, it is imperative to take necessary steps to make Linux more secure. To see what your hardening linux james turnbull thought tufnbull this book, please sign up.
By page 50, he had also shown how to compile your kernel with security flags and the Openwall project. The penultimate chapter in this book pursues configuring an ftp server. This chapter gives a very good idea of the concept of firewall and how one can leverage the use of iptables to make ones linyx more secure.
This book titled – Hardening Linux – by James Turnbull concentrates on this linuxx important topic of securing your Linux machine. A firewall forms one of the most important element in a computer’s defence against attack.