Practical UNIX and Internet Security Ebook

Publication: O'Reilly Media
 
Is my Device Supported?


Sorry, this ebook is not available for sale. Please take a look at other works by author, or good alternatives from the same category.

Description

When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book- a companion for the Unix/Linux system administrator who needs to secure his or her organization’s system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today—Solaris, Mac OS X, Linux, and FreeBSD—this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more. Practical Unix & Internet Security consists of six parts:

  • Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security.
  • Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security.
  • Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun’s RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming.
  • Secure operations: keeping up to date in today’s changing security world, backups, defending against attacks, performing integrity management, and auditing.
  • Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security.
  • Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research.

Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today’s threats.

Should you buy this Ebook?

We've put together a collection of resources to help you make a decision regarding whether you should buy this Ebook from us.

  1. Is your device one of these? Ebook reading software will work on the following devices: Windows, Mac, Android 2.2+ Devices, IPad (iOS 3+), IPhone (iOS 3+), Kindle Fire. Several other devices are also supported by the software.
  2. Compare prices. Our price is $38.30. If you would like to research our competitors to see their prices. Here're some places to look:
  3. Why should you buy Ebooks from onlinebookplace.com?

    We've had 1000s of downloads so far and with over 300000+ Ebooks to choose from, onlinebookplace.com is becoming a favorite Ebook Store for many. Allow us to win you over with our competitive pricing, upfront policies and diligent customer service.

    We're Upfront:

    • Every Ebook page on onlinebookplace.com has information on restrictions that publishers have placed on the Ebook along with a clear indication of software required to read the Ebooks.
    • If ratings for an Ebook are available from one of several sources online, then we've attempted to get those to help you make a better purchasing decision about the Ebook. Reviews from Goodreads (a popular reviews site) are provided on the same if they're available.
    • In most cases, we've also attempted to get you links to the Ebook on our competitor's site so that you can compare prices with relative ease.
    • We use McAfee to scan for any vulnerabilities in the system to ensure that any information that you give us does not fall into the wrong hands.
    • We use Paypal, a trusted 3rd party payment provider to accept Payments -- your payment information doen't reside with us. Any information that does end up with us is safe.

Check below for device compatibility and any free 3rd-party software requirements. Choice of what ebook reading app to use is yours, we only present a few common apps that several customers of ours have preferred. You should be able to transfer your purchase to more than one (upto 6) compatible devices as long as your ebook-reading apps have been registered with the same Adobe ID before opening the file.

Computers/laptops/Mac

Windows/Mac PC or Laptop

Free app Adobe Reader required.

Android

Android 2.1+

Most Android devices already have ability to open this format. In case your hardware doesn't, then Adobe Reader may need to be installed.

Kindle Fire (and any Android based Kindle models)

Kindle Should be able to open this format natively.

IPhone/IPad

IPad or IPhone

Most iPhone/iPad devices may already have ability to open this format. In case your hardware doesn't, then Adobe Reader may need to be installed.

Other E-Reader

Several Other devices supported

Most iPhone/iPad devices may already have ability to open PDF or EPub this format. Please refer to your device's documentation to ensure that there is support.

Practical UNIX and Internet Security