• Complain

William Rothwell - Linux Essentials for Cybersecurity

Here you can read online William Rothwell - Linux Essentials for Cybersecurity full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2018, publisher: Pearson Education, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

William Rothwell Linux Essentials for Cybersecurity

Linux Essentials for Cybersecurity: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Linux Essentials for Cybersecurity" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATAIN ONE BOOKFrom the basics to advanced techniques: no Linux security experience necessaryRealistic examples & step-by-step activities: practice hands-on without costly equipmentThe perfect introduction to Linux-based security for all students and IT professionalsLinux distributions are widely used to support mission-critical applications and manage crucial data. But safeguarding modern Linux systems is complex, and many Linux books have inadequate or outdated security coverage.Linux Essentials for Cybersecurity is your complete solution. Leading Linux certification and security experts William Bo Rothwell and Dr. Denise Kinsey introduce Linux with the primary goal of enforcing and troubleshooting security. Their practical approach will help you protect systems, even if one or more layers are penetrated.First, youll learn how to install Linux to achieve optimal security upfront, even if you have no Linux experience. Next, youll master best practices for securely administering accounts, devices, services, processes, data, and networks. Then, youll master powerful tools and automated scripting techniques for footprinting, penetration testing, threat detection, logging, auditing, software management, and more.To help you earn certification and demonstrate skills, this guide covers many key topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized clearly and logically for easy understanding, effective classroom use, and rapid on-the-job training.LEARN HOW TO: Review Linux operating system components from the standpoint of security Master key commands, tools, and skills for securing Linux systems Troubleshoot common Linux security problems, one step at a time Protect user and group accounts with Pluggable Authentication Modules (PAM), SELinux, passwords, and policies Safeguard files and directories with permissions and attributes Create, manage, and protect storage devices: both local and networked Automate system security 24/7 by writing and scheduling scripts Maintain network services, encrypt network connections, and secure network-accessible processes Examine which processes are runningand which may represent a threat Use system logs to pinpoint potential vulnerabilities Keep Linux up-to-date with Red Hat or Debian software management tools Modify boot processes to harden security Master advanced techniques for gathering system information

William Rothwell: author's other books


Who wrote Linux Essentials for Cybersecurity? Find out the surname, the name of the author of the book and a list of all author's works by series.

Linux Essentials for Cybersecurity — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Linux Essentials for Cybersecurity" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
About This E-Book

EPUB is an open, industry-standard format for e-books. However, support for EPUB and its many features varies across reading devices and applications. Use your device or app settings to customize the presentation to your liking. Settings that you can customize often include font, font size, single or double column, landscape or portrait mode, and figures that you can click or tap to enlarge. For additional information about the settings and features on your reading device or app, visit the device manufacturers Web site.

Many titles include programming code or configuration examples. To optimize the presentation of these elements, view the e-book in single-column, landscape mode and adjust the font size to the smallest setting. In addition to presenting code and configurations in the reflowable text format, we have included images of the code that mimic the presentation found in the print book; therefore, where the reflowable format may compromise the presentation of the code listing, you will see a Click here to view code image link. Click the link to view the print-fidelity code image. To return to the previous page viewed, click the Back button on your device or app.

Linux Essentials for Cybersecurity

William Bo Rothwell
Denise Kinsey

Linux Essentials for Cybersecurity Copyright 2019 by Pearson Education Inc - photo 1

Linux Essentials for Cybersecurity

Copyright 2019 by Pearson Education, Inc.

All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein.

ISBN-13: 978-0-7897-5935-1

ISBN-10: 0-7897-5935-7

Library of Congress Control Number: 2018941152

1 18

Trademarks

All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark.

Warning and Disclaimer

Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an as is basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book.

Special Sales

For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at or (800) 382-3419.

For government sales inquiries, please contact .

For questions about sales outside the U.S., please contact .

Editor-In-Chief: Mark Taub

Product Line Manager: Brett Bartow

Executive Editor: Mary Beth Ray

Development Editor: Eleanor Bru

Managing Editor: Sandra Schroeder

Project Editor: Mandie Frank

Copy Editor: Bart Reed

Indexer: Ken Johnson

Proofreader: Debbie Williams

Technical Editors: Casey Boyles, Andrew Hurd, Ph.D.

Publishing Coordinator: Vanessa Evans

Designer: Chuti Prasertsith

Composition: Studio Galou

Contents at a Glance
Table of Contents
About the Authors

William Bo Rothwell At the impressionable age of 14, William Bo Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a Trash 80). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TRS-80, he immediately dismantled it and held his first computer class, showing his friends what made this computer thing work.

Since this experience, Bos passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and president of One Course Source, an IT training organization.

Denise Kinsey, Ph.D, CISSP, CISCO Dr. Denise Kinsey served as a Unix administrator (HP-UX) in the late 1990s and realized the power and flexibility of the operating system. This appreciation led to her home installation of different flavors of Linux and creation of several academic courses in Linux. With a strong background in cybersecurity, she works to share and implement best practices with her customers and students. Dr. Kinsey is an assistant professor at the University of Houston.

Dedications

For the last three books, I have thanked my wife and daughter for their patience, and my parents for all that they have done throughout my life. My gratitude continues, as always.

William Bo Rothwell

May 2018

This book is dedicated to

My family, who inspire and encourage me

My students, whom I work to inspire and who inspire me

Those who are interested in Linux and/or cybersecurity. I hope you find the information useful, valuable, and easily applicable.

Denise Kinsey

Acknowledgments

Thanks to everyone who has put in a direct effort toward making this book a success:

  • Denise, my co-author, for her extremely valuable insight and for dealing with the chaos around my creative process.

  • Mary Beth, for putting her trust in me for yet another book.

  • Eleanor and Mandie, for keeping me on track (with very gentle reminders) and all of the hard work and dedication.

  • Casey and Andrew, for excellent feedback and for proving four brains are better than two.

  • Bart Reed, for painsteakingly painstakingly reviewing every word, sentence, graphic, table, and punctuation character.

  • And all the other folks at Pearson who have had an impact on this book.

I have always felt that I was fortunate because I had strong technical skills combined with the ability to impart my knowledge to others. This has allowed me to be an IT corporate instructor and courseware developer for almost 25 years now. It is the experiences I have had teaching others that have put me in a position to write a book like this. So, I would also like to acknowledge the following people:

  • All of the students who have listened to me for countless hours (I have no idea how you do this). I teach to see the light bulbs go on in your heads. You have taught me patience and given me an understanding that everyone needs to start from some place. Thanks for making me a part of your journey.

  • All of the excellent instructors I have observed. There have been so many of them, it would be impossible to list them all here. Im a much better knowledge facilitator because of what I have learned from you.

  • Lastly, I have no way to express my gratitude toward people like Linus Torvalds. Without pioneers like Linus (who is one of a great many), so much of the technology we now take for granted just wouldnt exist. These folks have given us all the opportunity to learn tools that we can use to make even more great inventions. I urge you to not think of Linux as just an operating system, but rather as a building block that allows you and others to create even more amazing things.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Linux Essentials for Cybersecurity»

Look at similar books to Linux Essentials for Cybersecurity. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Linux Essentials for Cybersecurity»

Discussion, reviews of the book Linux Essentials for Cybersecurity and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.