Linux security techniques:
This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and j...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch Video |
Sprache: | Englisch |
Veröffentlicht: |
[Birmingham, United Kingdom]
Packt Publishing Ltd.
2024
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781835887042/?ar |
Zusammenfassung: | This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed March 19, 2024) |
Umfang: | 1 Online-Ressource (1 video file (10 hr., 48 min.)) sound, color. |
ISBN: | 9781835887042 183588704X |
Internformat
MARC
LEADER | 00000ngm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-10220747X | ||
003 | DE-627-1 | ||
005 | 20240404083423.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 240404s2024 xx ||| |o o ||eng c | ||
020 | |a 9781835887042 |c electronic video |9 978-1-83588-704-2 | ||
020 | |a 183588704X |c electronic video |9 1-83588-704-X | ||
035 | |a (DE-627-1)10220747X | ||
035 | |a (DE-599)KEP10220747X | ||
035 | |a (ORHE)9781835887042 | ||
035 | |a (DE-627-1)10220747X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240319 | |
245 | 1 | 0 | |a Linux security techniques |
250 | |a [First edition]. | ||
264 | 1 | |a [Birmingham, United Kingdom] |b Packt Publishing Ltd. |c 2024 | |
300 | |a 1 Online-Ressource (1 video file (10 hr., 48 min.)) |b sound, color. | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed March 19, 2024) | ||
520 | |a This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats. | ||
630 | 2 | 0 | |a Linux |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Client/server computing | |
650 | 0 | |a Web servers | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Architecture client-serveur (Informatique) | |
650 | 4 | |a Serveurs Web | |
650 | 4 | |a Instructional films | |
650 | 4 | |a Nonfiction films | |
650 | 4 | |a Internet videos | |
650 | 4 | |a Films de formation | |
650 | 4 | |a Films autres que de fiction | |
650 | 4 | |a Vidéos sur Internet | |
700 | 1 | |a Pezet, Don |e MitwirkendeR |4 ctb | |
700 | 1 | |a Memos, Zachary |e MitwirkendeR |4 ctb | |
710 | 2 | |a ACI Learning (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Packt Publishing, |e Verlag |4 pbl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781835887042/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-10220747X |
---|---|
_version_ | 1821494933780955136 |
adam_text | |
any_adam_object | |
author2 | Pezet, Don Memos, Zachary |
author2_role | ctb ctb |
author2_variant | d p dp z m zm |
author_corporate | ACI Learning (Firm) |
author_corporate_role | ctb |
author_facet | Pezet, Don Memos, Zachary ACI Learning (Firm) |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)10220747X (DE-599)KEP10220747X (ORHE)9781835887042 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03020ngm a22005652 4500</leader><controlfield tag="001">ZDB-30-ORH-10220747X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240404083423.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240404s2024 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835887042</subfield><subfield code="c">electronic video</subfield><subfield code="9">978-1-83588-704-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">183588704X</subfield><subfield code="c">electronic video</subfield><subfield code="9">1-83588-704-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)10220747X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP10220747X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835887042</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)10220747X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240319</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Linux security techniques</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Birmingham, United Kingdom]</subfield><subfield code="b">Packt Publishing Ltd.</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 video file (10 hr., 48 min.))</subfield><subfield code="b">sound, color.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed March 19, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web servers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture client-serveur (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Serveurs Web</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Instructional films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Nonfiction films</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet videos</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films de formation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Films autres que de fiction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vidéos sur Internet</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pezet, Don</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Memos, Zachary</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ACI Learning (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Packt Publishing,</subfield><subfield code="e">Verlag</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835887042/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-10220747X |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:15Z |
institution | BVB |
isbn | 9781835887042 183588704X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 video file (10 hr., 48 min.)) sound, color. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Packt Publishing Ltd. |
record_format | marc |
spelling | Linux security techniques [First edition]. [Birmingham, United Kingdom] Packt Publishing Ltd. 2024 1 Online-Ressource (1 video file (10 hr., 48 min.)) sound, color. zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed March 19, 2024) This course offers an in-depth exploration of Linux Security Techniques, guiding you through essential security measures to protect Linux environments. Starting with an overview of modern Linux distribution security features, it moves to practical applications such as managing logs with syslog and journald, auditing user passwords, and configuring firewalls for robust protection. Through hands-on examples, you'll learn to audit filesystems, secure services with SELinux, and isolate applications using chroot jails and LXC containers. The course emphasizes the importance of data security, introducing LUKS disk encryption and GPG for data-at-rest security. It concludes with practical network security strategies and essential security testing, including firewall configuration verification and network data encryption analysis with tools like Wireshark and TCPDUMP. This journey equips you with the skills to implement and verify comprehensive security measures, ensuring your Linux systems are safeguarded against evolving threats. Linux Computer networks Security measures Client/server computing Web servers Réseaux d'ordinateurs ; Sécurité ; Mesures Architecture client-serveur (Informatique) Serveurs Web Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet Pezet, Don MitwirkendeR ctb Memos, Zachary MitwirkendeR ctb ACI Learning (Firm), MitwirkendeR ctb Packt Publishing, Verlag pbl |
spellingShingle | Linux security techniques Linux Computer networks Security measures Client/server computing Web servers Réseaux d'ordinateurs ; Sécurité ; Mesures Architecture client-serveur (Informatique) Serveurs Web Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
title | Linux security techniques |
title_auth | Linux security techniques |
title_exact_search | Linux security techniques |
title_full | Linux security techniques |
title_fullStr | Linux security techniques |
title_full_unstemmed | Linux security techniques |
title_short | Linux security techniques |
title_sort | linux security techniques |
topic | Linux Computer networks Security measures Client/server computing Web servers Réseaux d'ordinateurs ; Sécurité ; Mesures Architecture client-serveur (Informatique) Serveurs Web Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
topic_facet | Linux Computer networks Security measures Client/server computing Web servers Réseaux d'ordinateurs ; Sécurité ; Mesures Architecture client-serveur (Informatique) Serveurs Web Instructional films Nonfiction films Internet videos Films de formation Films autres que de fiction Vidéos sur Internet |
work_keys_str_mv | AT pezetdon linuxsecuritytechniques AT memoszachary linuxsecuritytechniques AT acilearningfirm linuxsecuritytechniques AT packtpublishing linuxsecuritytechniques |