Nov 1, Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of. Hardening Linux has 34 ratings and 2 reviews. Hardening is the process of protecting a system and its applications against unknown threats. Hardening L. Hardening Linux. Author: James Turnbull. Publication: Cover Image. · Book. Hardening Linux View colleagues of James Turnbull. top of page REFERENCES.

Author: Shaktigal Zolokree
Country: Martinique
Language: English (Spanish)
Genre: Photos
Published (Last): 23 August 2014
Pages: 368
PDF File Size: 19.12 Mb
ePub File Size: 19.64 Mb
ISBN: 119-2-51167-285-6
Downloads: 5648
Price: Free* [*Free Regsitration Required]
Uploader: Kale

It is common for the production server to be physically situated in one country and the support personnel in an entirely different country.

Nick rated it liked it Oct 19, But as with any OS, it is imperative to take necessary steps to make Linux more secure. Sabatine Ringbound, Revised Edition, Even though we’re talking about a hardening linux james turnbull of which purpose is to help you to secure your Linux server, I felt like I learned more about Linux reading this book than I’ve learned during the last year at work.

Hardening Linux – James Turnbull – Google Books

Open Preview See a Problem? James Howe Paperback Books.

Here the author explains the basic file permissions and attributes as well as how one can make sure there are no suspicious files hardening linux james turnbull around in the system. There are no discussion topics on this book yet.


The Expert’s Voice in Open Source: Hardening Linux by James Turnbull (2005, Paperback, New Edition)

Hardening linux james turnbull Chandra rated it it was amazing Apr 19, But now a days, it has also widely found favour as a desktop replacement for windows.

It is precicely because of this reason that the printing media is hardening linux james turnbull going to linix bust. Alex rated it really liked it Dec 03, Save on Textbooks, Education Trending price is based on prices over last 90 days. Wade Johnson I was kames bit surprised when I scanned the table of contents.

Most Linux servers are administered remotely from different places across the world. Books by James Turnbull.

Similar Threads

In my experience, the majority of developers dealing with Linux — myself included — don’t really know much hardening linux james turnbull Linux file system security beyond the basic hardwning permission attributes. Oct 31, Takedown rated it it was ok Shelves: Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks.

He then goes on to explain how to securely design and configure a Bind DNS server. Useful review, thanks; however I don’t think I’ll buy such a book when the same information is available online for free, no?

The Expert’s Voice in Lijux Source: Very outdated, just read checkpoints and you good to go. Christian rated it really liked it Jul 15, The author starts the narration by explaining why and how one hardening linux james turnbull make the boot-loader Grub or LiLo more secure. Paulo Roncon rated it really liked it Jun 27, The book is divided into 11 chapters and 3 appendices each covering a niche area related to security in Linux. Rodrigo Ramos rated it it was amazing Feb 18, One can learn a lot by checking the logs generated jmes the various trnbull running on it.


Hardening Linuxby James Turnbull belongs on the shelf of anyone who installs and maintains Linux servers. This book titled – Hardening Linux – by James Hardening linux james turnbull concentrates on this very important topic of securing your Linux machine.

Hardening Linux by James Turnbull (Books forum at Coderanch)

After the rather intense first chapter, the rest of the book’s hardening linux james turnbull each focus on a certain aspect of a system or a specific product, showing how to secure your system from that particular perspective. You may also like.

A firewall forms one of the most important element in a computer’s defence against attack. Matthew rated it really liked it Jun 20,