Linux Hardening In Hostile Networks

Author: Kyle Rankin
Editor: Prentice Hall
ISBN: 9780134173269
File Size: 20,42 MB
Format: PDF, Mobi
Read: 1680
Download

In an age of massive global surveillance, when last year's most advanced cyberwarfare weapons quickly migrate into every hacker's toolkit, you can no longer afford to rely on outdated security methods. If you care about privacy and security today, you need to step up your game -- especially if you're a sysadmin responsible for Internet-facing services. That means you need to master and use advanced security technologies like the TLS communications security protocol, PGP encryption, and the Tor anonymity network. Tools like these have often been viewed as too complex or mysterious for mainstream use. In Security Under Surveillance, Kyle Rankin completely demystifies them, and offers practical, accessible guidance on protecting yourself and your users with them. Rankin begins with a user-oriented guide to safeguarding your own personal data with PGP, Off-the-Record Messaging (OTR), Tor, and the Tails "amnesic incognito" live Linux distribution. Next, he guides you through setting up secured versions of the services you manage every day, including web, email, and database servers that communicate over TLS; locked-down DNS servers with DNSSEC; Tor servers, and hidden services. Each category of solution is presented in its own chapter, with techniques organized based on difficulty level, time commitment, and overall threat. In each case, Rankin begins with techniques any system administrator can quickly implement to protect against entry-level hackers. Next, he moves on to intermediate and advanced techniques intended to safeguard against sophisticated and knowledgeable attackers. An accompanying DVD contains a full, pre-configured copy of the Tails live Linux distribution, making it simple for any sysadmin to bootstrap a highly-secure, privacy-protecting environment in minutes."
Linux Hardening in Hostile Networks
Language: un
Pages: 300
Authors: Kyle Rankin
Categories: Computers
Type: BOOK - Published: 2017-03-30 - Publisher: Prentice Hall

In an age of massive global surveillance, when last year's most advanced cyberwarfare weapons quickly migrate into every hacker's toolkit, you can no longer afford to rely on outdated security methods. If you care about privacy and security today, you need to step up your game -- especially if you're
Linux Hardening in Hostile Networks
Language: un
Pages:
Authors: Kyle Rankin
Categories: Computers
Type: BOOK - Published: 2017 - Publisher:

Books about Linux Hardening in Hostile Networks
Real-World SRE
Language: en
Pages: 340
Authors: Nat Welch
Categories: Computers
Type: BOOK - Published: 2018-08-31 - Publisher: Packt Publishing Ltd

This hands-on survival manual will give you the tools to confidently prepare for and respond to a system outage. Key Features Proven methods for keeping your website running A survival guide for incident response Written by an ex-Google SRE expert Book Description Real-World SRE is the go-to survival guide for
Cybersecurity Best Practices
Language: de
Pages: 644
Authors: Michael Bartsch, Stefanie Frey
Categories: Computers
Type: BOOK - Published: 2018-07-20 - Publisher: Springer-Verlag

Das Thema Cybersecurity ist so aktuell wie nie, denn im Cyberspace lassen sich nur schwer Grenzen in Bezug auf den Zugang zu Informationen, Daten und Redefreiheit setzen. Kriminelle nutzen die L├╝cken oft zu ihrem Vorteil aus. Die Vielzahl der IT-Systeme, ihre unterschiedlichen Nutzungsarten und ihre Innovations- und Lebenszyklen haben zu
Hardening Linux
Language: en
Pages: 404
Authors: John H. Terpstra
Categories: Computers
Type: BOOK - Published: 2004 - Publisher: McGraw Hill Professional

An informative handbook for network administrators and professionals who use Linux offers practical guidelines on how to test, hack, and find security holes and secure them, explaining how to assess one's system, shut down unnecessary services and access, install filters and firewalls, eliminate unnecessary software, enhance authentication and user identity