This free book "How to cheat at Securing Linux" covers hardening of operating system,
implementing an intrusion detection system and defending databases. How to Cheat at Securing Linux Servers is designed to help you deploy a Linux system on the Internet in a variety of security roles. This book provides practical instructions and pointers concerning the open source security tools that we use every day. This book shows you how to use your Linux skills to provide the most important security services such as encryption, authentication, access control, and logging. While writing the book, the authors had the following three-part structure in mind: locking down the network, securing data passing across the network,and protecting the network perimeter with firewalls, DMZs, and VPNs.Linux servers now account for 33% of all networks servers running worldwide.The top 3 market share holders in the network server space all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies,increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux.There were more attacks against Windows machines because there were simply so many
more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide,but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers.


Book Contents:-

Chapter 1: Introduction to Open Source Security

Chapter 2: Hardening the Operating System

Chapter 3: System Scanning and Probing

Chapter 4: Implementing an Intrusion Detection System

Chapter 5: Troubleshooting the Network with Sniffers

Chapter 6: Unearthing Rootkits

Chapter 7: Defending Against Malware

Chapter 8: Defending Databases

Chapter 9: Network Authentication and Encryption

Chapter 10: Avoiding Sniffing Attacks through Encryption

Chapter 11: Creating Virtual Private Networks

Chapter 12: Implementing and Maintaining a Firewall



Download link

Non Camera SmartPhones