Image from Google Jackets

Security strategies in Linux platforms and applications / Ric Messier, Michael Jang.

By: Contributor(s): Material type: TextTextPublication details: Burlington, MA : World Headquarters Jones & Bartlett Learning, [2024]Edition: Third editionDescription: xxv, 534 pages ; 24 cmISBN:
  • 9781284255850 (paperback)
Subject(s): LOC classification:
  • QA76.76.O63 J385 2024
Summary: "Incorporating real-world examples and exercises throughout, Security Strategies in Linux Platforms and Applications discusses every major aspect of security on a Linux system, including coverage of the latest Linux distributions and kernels. Written by industry experts, the text opens with a review of the risks, threats, and vulnerabilities associated with Linux as an operating system. Part 2 discusses how to take advantage of the layers of security available to Linux - user and group options, filesystems, and security options for important services. The text concludes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Books University of Kalba QA76.76.O63 J385 2024 (Browse shelf(Opens below)) Available 00-1-364889

Includes bibliographical references and index.

"Incorporating real-world examples and exercises throughout, Security Strategies in Linux Platforms and Applications discusses every major aspect of security on a Linux system, including coverage of the latest Linux distributions and kernels. Written by industry experts, the text opens with a review of the risks, threats, and vulnerabilities associated with Linux as an operating system. Part 2 discusses how to take advantage of the layers of security available to Linux - user and group options, filesystems, and security options for important services. The text concludes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments"-- Provided by publisher.

There are no comments on this title.

to post a comment.

© 2025 University of Kalba. All Rights Reserved.