Security strategies in Linux platforms and applications
Part of the Jones & Bartlett Learning information systems security & assurance series series
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES - Click here to learn more: http://www.issaseries.com/ The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system.
Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field.
It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases.
Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux.
The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments.
Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Instructor Materials for Security Strategies in Linux Platforms and Applications include: PowerPoint Lecture Slides Exam Questions Case Scenarios/HandoutsAbout the SeriesThis book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning.
Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area.
These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security.
Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking-putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.