Vtome.ru - электронная библиотека

Linux: Linux Security and Administration

  • Добавил: literator
  • Дата: 23-03-2021, 19:18
  • Комментариев: 0
Linux: Linux Security and AdministrationНазвание: Linux: Linux Security and Administration
Автор: Andy Vickler
Издательство: Amazon.com Services LLC
Год: 2021
Страниц: 114
Язык: английский
Формат: pdf, azw3, epub
Размер: 10.1 MB

Did you wonder what the Linux operating system is and how you can install it on your system? Do you want to learn how to separate the Linux operating system from the main operating system used? Have you been trying to learn how to perform penetration testing or other ethical hacking processes to determine the security of the server or network? If you answered yes to these questions, then you have come to the right place.

Linux is an operating system used by system administrators and hackers to manage the server or network's security. You can use the operating system to address business demands, including network administration, system administration, and database management. In this book, you will learn more about the different techniques to help you protect the system from a security breach and how you can protect the files and data you have on your system.

In this book, you will first learn about how you can use Linux on virtual machines. You will also learn about the different tools you can use to harden the network and server's security. You will learn about the different permissions and accesses and how you can use it to enhance the security of setting the security. You will also learn about how you can perform a penetration test, or an ethical hack, to scan the system and see what you can do to improve the settings.

If you want to perform an analysis of your system’s security, you need to use the Kali Linux distro. This is a powerful tool you can use to assess the vulnerabilities in the system. In this chapter, we will look at how you can download and install the Kali Linux distro in your system and use various penetration testing tools which are built into the operating system. These tools will help any system administrator while conducting penetration tests in the various stages of the penetration testing lifecycle.

Over the course of this book, you will discover how to:

Installing Linux on your system and accessing it using a virtual machine
Secure user accounts using passwords and ACLs
Secure the server using a firewall and other methods
Learn to decrypt and encrypt data sent over the network
Explore various methods to prevent hackers from accessing information in your system
Perform tests to identify any vulnerabilities in the network and server, and more!

Скачать Linux: Linux Security and Administration












ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.