在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → 《Practical Linux Security Cookbook 》 《linux系统安全》

《Practical Linux Security Cookbook 》 《linux系统安全》

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:16.16M
  • 下载次数:26
  • 浏览次数:267
  • 发布时间:2020-09-01
  • 实例类别:一般编程问题
  • 发 布 人:robot666
  • 文件格式:.pdf
  • 所需积分:2
 

实例介绍

【实例简介】
linux系统安全,下载,清晰pdf版本
Practical Linux Security Cookbook Copyright C 2016 Packt Publishing All rights reserved No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented, However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information First published: April 2016 Production reference: 1260416 Published by Packt Publishing Ltd Livery Place 35 Livery Street Birmingham B3 2PB, UK SBN978-1-78528-642-1 www.packtpub.co Credits Author Copy Editors Tajinder Kals Sonia cheema Safis editing Nick Glynn Project Coordinator Shweta h birwatkar Commissioning Editor Veena Pagare Proofreader Safis editing Acquisition Editor vya PooJarI Indexer Rekha nair Content Development Editor Mehvash Fatima Production Coordinator Aparna bhagat Technical editors Gebin Geo Cover work Anushree arun tendulkar Aparna Bhagat About the Author Tajinder Kalsi is an innovative professional with more than 9 years of progressive experience within the information security industry. he has a good amount of knowledge and experience in web application testing, vulnerability assessment, network penetration testing, and risk assessment At present, he is working as an independent information security consultant. He started his career with Wipro as a technical associate, and later on he became an ISMs consultant cum technical evangelist. In his free time, he conducts seminars in colleges all across India on various topics, and he has covered more than 125 colleges and spoken to 10,000+ students In the past, he has reviewed books such as Web Application Penetration Testing with Kall Linux, Mastering Kali Linux for Advanced Penetration Testing, and Advanced wireless Penetration Testing for Highly-Secured Environments YoucanfindhimonFacebookatwww.facebookcom/tajinder.kalsi.tj,orcontact himonhiswebsiteatwww.tajinderkalsi.com. About the reviewer Nick Glynn is a senior software /APl engineer working for freelancer. com, where he provides backend and platform support across the stack using the latest technologies Drawing on his broad range of experience from board bring up Linux driver development and systems development through to full stack deployments, web app development and security hardening for both the linux and android platforms, Nick continues his independent efforts as a training instructor and consultant, delivering courses and expertise on Go, Python, and secure LinuxdevelopmentacrosstheglobethroughhiscompanyCuriola(www.curiola.com I would like to thank my family for their love and my beautiful daughter, Inara, for always being there to brighten my day www.packtpub.com eBooks discount offers and more Did you know that Packt offers e Book versions of every book published, with PDF and e Pub filesavailableYoucanupgradetotheebookversionatwww.PacktPub.comandasaprint book customer, you are entitled to a discount on the eBook copy. Get in touch with us at customercare@packtpub com for more details. Atwww.Packtpub.comyoucanalsoreadacollectionoffreetechnicalarticlessignup for a range of free newsletters and receive exclusive discounts and offers on Packt books and ebooks PACKTLIB https://www2.packtpub.com/books/subscription/packtlib Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can search, access, and read Packt's entire library of books Why Subscribe? Fully searchable across every book published by Packt Copy and paste, print, and bookmark content On demand and accessible via a web browser Table of contents Preface Chapter 1: Linux Security Problems Introduction 1 The security policy of Linux 2 Configuring password protectlon 2 Configuring server security Security controls 5 Conducting integrity checks of the installation medium by using checksum 5 Using the LUKS disk encryption Making use of sudoers configuring sudo access 9 Scanning hosts with Nmap 12 Gaining a root on a vulnerable Linux system 15 Chapter 2: Configuring a Secure and Optimized Kernel 21 Introduction 21 Requirements for building and using a kernel 22 Creating a USB boot media 22 Retrieving a kernel source 23 Configuring and building a kernel 25 Installing and booting from a kernel 31 Testing and debugging a kernel 34 Configuring a console for debugging using Netconsole 34 Debugging a kernel on boot 41 Chapter 3: Local Filesystem Security 43 Viewing files and directory details using the Is command 43 Changing file permissions using the chmod command 46 Implementing access control list (ACL) 50 Table of contents File handling using the mv command ( moving and renaming) 54 Install and configure a basic LDAP server on Ubuntu 60 Chapter 4: Local Authentication in Linux 71 User authentication and logging 71 Limiting the login capabilities of users 75 Monitoring user activity using acct 78 Login authentication using a UsB device and PAM 82 Defining user authorization controls Chapter 5: Remote Authentication 91 Remote server/host access using ssH 91 Disabling or enabling SSH root login 95 Restricting remote access with key-based login into SSH 99 Copying files remotely 102 Setting up a Kerberos server with Ubuntu 107 Chapter 6: Network Security 117 Managing the TCP/IP network 117 Using Iptables to configure a firewall 121 Blocking spoofed addresses 127 Blocking incoming traffic 130 Configuring and using the TCP Wrapper 135 Chapter 7: Security Tools 141 LinUx sKID 141 Portsentry 144 Using Squid proxy 150 Open SSL Server 154 Tripwire 160 Shorewall 167 Chapter 8: LinuX Security Distros 173 Kali linux 173 pfsense 179 DEFT-Digital Evidence and Forensic Toolkit 185 NST- Network Security Toolkit 192 Helix 196 Chapter 9: Patching a Bash vulnerability 203 Understanding the bash vulnerability through shellshock 203 Shellshock's security issues 207 The patch management system 212 Applying patches on the Linux systems 218 Table of contents Chapter 10: Security Monitoring and logging 223 Viewing and managing log files using Logcheck 223 Monitoring a network using Nmap 227 Using glances for system monitoring 231 Monitoring Logs using MultiTail 234 Using system tools -Whowatch 237 Using system tools- stat 241 Using system tools- Isof 244 Using system tools- strace 247 Using Lynas 251 Index 255 II 【实例截图】
【核心代码】

标签:

实例下载地址

《Practical Linux Security Cookbook 》 《linux系统安全》

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警