Nov 1, Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of. Hardening Linux has 34 ratings and 2 reviews. Hardening is the process of protecting a system and its applications against unknown threats. Hardening L. Hardening Linux. Author: James Turnbull. Publication: Cover Image. · Book. Hardening Linux View colleagues of James Turnbull. top of page REFERENCES.
|Published (Last):||28 August 2005|
|PDF File Size:||18.2 Mb|
|ePub File Size:||7.43 Mb|
|Price:||Free* [*Free Regsitration Required]|
Jason Anderson rated it liked it Jan 15, NEW – Battlefield of the Hardening linux james turnbull Evelyn Dickinson rated it really liked it Sep 08, The hadening of Linux is that one can configure to log the actions of any of the daemons running in it using the syslog daemon.
I especially liked the part which explains ways of scanning for and finding files hardening linux james turnbull objects in a variety of states like world-writable and setuid files, making your files immutable, creating an encrypted file system and so on.
Turnbull kick starts the book by explaining user and group management, basics of the Linux file system security, how to verify downloaded packages, which tools and packages you probably should remove from a production server.
Which I usually print out The book is a right mix of both theory and practice which makes it a very useful book for people who are tufnbull forward to securing their computer running Hardening linux james turnbull.
Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks.
Paperbackpages. Logging is a very important function in any Linux server. Tivo Hacks by Raffi Krikorian. No trivia or quizzes yet. And true to the title of the book, all along, stress is laid on hardening linux james turnbull while explaining these hardening linux james turnbull. Overly prescriptive and boring. Highly recommended reading if you’re running a Linux box you wouldn’t want getting “0wn3d.
This item doesn’t belong on this page. Skip to main content.
The Expert’s Voice in Open Source: Hardening Linux by James Turnbull (2005, Paperback, New Edition)
Hardening Linuxidentifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks. Henretta, Eric Hinderaker and Robert O. Show More Show Less. Hardening Linux, Paperback by Turnbull, James.
Kyle rated it it was amazing Aug 08, He harxening light on the various services that could be running on a hardening linux james turnbull installation of Linux and explores which of them are beneficial and which could be stopped. This chapter gives a very good idea of the concept of firewall hardening linux james turnbull how one can leverage the use of iptables to make ones computer more secure.
Hardening Linux – James Turnbull – Google Books
For example, Turnbull presents the most intuitive tutorial hardening linux james turnbull configuring the iptables firewall I’ve seen so far. Return to Book Liinux. Tom Gleason rated it it was ok Jul 06, After the rather intense first chapter, the rest of the book’s chapters each focus on a certain aspect of a system or a hardenlng product, showing how to secure your system from that particular perspective. There is also a section which explains the steps to be taken in the advent that a system gets compromised.
See details for additional description. This book is not yet featured on Listopia. Hradening rated it liked it Apr 06, Here the author explains the basic file permissions and hardening linux james turnbull as well as how one can make sure there are no suspicious files lying around in the system.
All in all, an excellent book on not just Linux security but also on Linux fundamentals. The fourth chapter of the book deals with the various facets of file and file system security.
Hardening Linux by James Turnbull.
There are no discussion topics on this book yet. Crow Killer, New Edition: The second chapter takes an in depth look at configuring a firewall using iptables in Linux. Eloisa James Paperback Books.
This chapter also goes into a detailed analysis of how one can install and configure Tripwire – a hardening linux james turnbull and integrity scanner famed for its robustness as well as cryptic configuration commands. I suppose its something to do when there’s a hardening linux james turnbull. In this chapter, the author goes into the nitty gritty hrdening of securing Linux like user and process accounting, PAM, how to harden and secure the Linux kernel through use of openwall patch and more.
It is favoured as a server over the competition by many for its robustness, stability and also its cost advantage.