How to Cheat at Securing LinuxHow to Cheat at Securing Linux
Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
Book, 2008
Current format, Book, 2008, , No Longer Available.Book, 2008
Current format, Book, 2008, , No Longer Available. Offered in 0 more formatsLinux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system.
This book teaches Linux system administrators how to protect their servers from malicious threats.
As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).
This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.
This book teaches Linux system administrators how to protect their servers from malicious threats.
As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).
This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.
Title availability
Find this title on
ProspectorAbout
Contributors
Subject and genre
Details
Publication
- Burlington, MA : Syngress, c2008.
Opinion
More from the community
Community lists featuring this title
There are no community lists featuring this title
Community contributions
Community quotations are the opinions of contributing users. These quotations do not represent the opinions of Jefferson County Public Library.
There are no quotations from this title
Community quotations are the opinions of contributing users. These quotations do not represent the opinions of Jefferson County Public Library.
There are no quotations from this title
From the community