DMCA. Copyrighted Work that you can Claim.
Base have 250 515 books.
Search: 


๐Ÿ“™ Hardening Linux (Volume 0) by James Turnbull โ€” download pdf


After reading this book, I think it is going to be the mandatory companion I hand out to new Linux administrators, along with Essential System Administration. The first 6 chapters are exceptional. I can't say enough good things about them. The coverage of PAM is better than anything I have seen. The coverage of authentication, groups, users and best practices surrounding them was very good as well. The logging chapter alone is probably worth the purchase of the book. After the first section, the book covers more specific topics that are of less interest to me. I realize that a lot of people use email, of all kinds. Chapter 7, 8 and 9 cover email, and I just wasn't that excited about it. Chapter 10 covered securing FTP, which is nice, and 11 covers Bind. I guess I wonder why some of the topics were chosen. There are whole books on email and bind, available, but there isn't always good material for some other services, like CUPS, maybe some web-based administration tools, or SELinux. The coverage of topics that made the table of contents are very good. I would say if you are new to Linux Security, or a seasoned player looking for just another reference, this book is great.

About book:

About file:

  • File size: 2 775 995
  • Format: pdf


Security code:
Download button

Similar books results


Hardening Linux
Hardening Linux pdf free by James Turnbull

"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book ...

HackNotes (tm) Linux and Unix Security Portable Reference
HackNotes (tm) Linux and Unix Security Portable Reference download pdf by Nitesh Dhanjani

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. This book will teach you how to protect and h...

Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation) epub download by Thomas Sterling

Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial application...

Beowulf Cluster Computing with Linux (Scientific and Engineering Computation)
Beowulf Cluster Computing with Linux (Scientific and Engineering Computation) epub download by Thomas Sterling

Beowulf clusters, which exploit mass-market PC hardware and software in conjunction with cost-effective commercial network technology, are becoming the platform for many scientific, engineering, and commercial application...

Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A epub download by Tony Howlett

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind...

Beowulf cluster computing with Linux
Beowulf cluster computing with Linux free pdf by William Gropp, Ewing Lusk, Thomas Sterling, Jon "maddog" Hall

This book includes how to build, program, and operate a Beowulf system based on the Linux operating system. A companion volume in the series provides the same information for Beowulf clusters based on the Microsoft Windows operating system....

Geometry of Algebraic Curves: Volume I
Geometry of Algebraic Curves: Volume I (Volume 1) free pdf by E. Arbarello, M. Cornalba, P. A. Griffiths, J. Harris (auth.)

In recent years there has been enormous activity in the theory of algebraic curves. Many long-standing problems have been solved using the general techniques developed in algebraic geometry during the 1950's and 1960's. Additionally, unexpected and deep c...

Routing TCP/IP, Volume 1
Routing TCP/IP, Volume 1 (Volume 1) download pdf by Jeff Doyle, Jennifer Carroll

A detailed examination of interior routing protocols - completely updated in a new edition* A complete revision of the best-selling first edition - widely considered a premier text on TCP/IP routing protocols* A core textbook for CCIE preparation and a pr...

Routing TCP/IP, Volume II
Routing TCP/IP, Volume II (Volume 2) pdf free by Jeff Doyle, Jennifer DeHaven Carroll

The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order ...

Gastrointestinal and Colorectal Anesthesia
Gastrointestinal and Colorectal Anesthesia download pdf by M. Kumar Chandra, Mark Bellamy

This resource stands as the only authoritative text to specifically focus on developments and best practices in anesthesiology for procedures affecting the gastrointestinal tract and related appendages. This book provides in-depth coverage of topics such ...

Principles and Practice of Surgery for the Colon, Rectum, and Anus, Third Edition
Principles and Practice of Surgery for the Colon, Rectum, and Anus, Third Edition download pdf by H. Gordon Philip, Santhat Nivatvongs

Supplying lavish color illustrations that fully detail key anatomical structures and pathology, this Third Edition encompasses the complete range of diseases encountered by colorectal surgeons in day-to-day clinical practice and spans topics related to an...

  Grossman's Cardiac Catheterization, Angiography, and Intervention
Grossman's Cardiac Catheterization, Angiography, and Intervention free pdf by Donald S. Baim

This brilliantly illustrated manual is a road map for the surgeon who wishes to perform a dissection exercise on the neck in the anatomic theatre. It guides the reader step by step through the cervical structures, the aim being to improve his/her technica...

Flexor Tendon Injuries

Carpal Disorders

Hand Transplantation
Hand Transplantation free pdf by Marco Lanzetta, Marco Lanzetta;Jean-Michel Dubernard

Hand Transplantation has been the dream of humanity until 1998, when a group of international surgeons gathered in Lyon performed the first of many hand transplantations carried out since then. This book presents the global international experimental and ...

  Handbook of Kidney Transplantation

High-Grade Gliomas Diagnosis and Treatment. Current Clinical Oncology
High-Grade Gliomas Diagnosis and Treatment. Current Clinical Oncology download pdf by Levon Michael Khachigian

Vulnerable plaque development is the result of a complex series of molecular and cellular events involving inflammation, apoptosis, rupture, and thrombosis. A detailed understanding of the mechanisms underlying the development of high-risk plaques, along ...

Hip Sonography Diagnosis and Management of Infant Hip Dysplasia
Hip Sonography Diagnosis and Management of Infant Hip Dysplasia epub download by Rudolf Hohenfellner

Endourology Step by Step. This manual is intended to help residents in urology learn the basic techniques of endourology. All authors are experts in this field and experienced teachers. Each chapter includes: indications, limits, risks and contraindicatio...

Image Processing in Radiology Current Applications
Image Processing in Radiology Current Applications free download by Thomas Bortfeld, Rupert Schmidt-Ullrich, Wilfried De Neve, David E. Wazer

Intensity-modulated radiation therapy (IMRT), one of the most important developments in radiation oncology in the past 25 years, involves technology to deliver radiation to tumors in the right location, quantity and time. Unavoidable irradiation ofย surrou...