|Listed in category:
Have one to sell?

Security Strategies in Linux Platforms and Applications by Michael Jang and Ric

US $99.97
ApproximatelyAU $153.73
or Best Offer
Condition:
Like new
Collection:
Postage:
Free USPS Media MailTM.
Located in: San Antonio, Texas, United States
Delivery:
Estimated between Mon, 11 Aug and Fri, 15 Aug to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the postage service selected, the seller's postage history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
No returns accepted.
Payments:
     Diners Club

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:176795357701

Item specifics

Condition
Like new: A book that looks new but has been read. Cover has no visible wear, and the dust jacket ...
ISBN
9781284090659

About this product

Product Identifiers

Publisher
Jones & Bartlett Learning, LLC
ISBN-10
1284090655
ISBN-13
9781284090659
eBay Product ID (ePID)
210831807

Product Key Features

Number of Pages
514 Pages
Publication Name
Security Strategies in Linux Platforms and Applications
Language
English
Publication Year
2015
Subject
Operating Systems / Linux, Operating Systems / General, Security / General, Security / Networking
Features
Revised
Type
Textbook
Subject Area
Computers
Author
Michael Jang, Ric Messier
Format
Trade Paperback

Dimensions

Item Height
0.6 in
Item Weight
32.1 Oz
Item Length
9.8 in
Item Width
5.9 in

Additional Product Features

Edition Number
2
LCCN
2015-028823
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Chapter1: Security Threats to Linux Chapter2: Basic Components of Linux Security Chapter3: Basic Security: Facilities Through the Boot Process Chapter4: User Privileges and Permissions Chapter5: Filesystems, Volumes, and Encryption Chapter6: Every Service Is a Potential Risk Chapter7: Networks, Firewalls, and More Chapter8: Networked Filesystems and Remote Access Chapter9: Networked Application Security Chapter10: Kernel Security Risk Mitigation Chapter11: Managing Security Alerts and Updates Chapter12: Building and Maintaining a Security Baseline Chapter13: Testing and Reporting Chapter14: Detecting and Responding to Security Breaches Chapter15: Best Practices and Emerging Technologies
Edition Description
Revised edition
Synopsis
Print Textbook & Cloud Lab Access: 180-day subscription. The cybersecurity Cloud Labs for Security Strategies in Linux Platforms and Applications provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training. Labs: Lab 1: Installing a Core Linux Operating System on a Server Lab 2: Configuring Basic Security Controls on a Centos Linux Server Lab 3: Hardening Security with User Account Management and Security Controls Lab 4: Applying Hardened Linux File System Security Controls Lab 5: Hardening Security for Linux Services and Applications Lab 6: Hardening Security by Controlling Access Lab 7: Hardening Security for the Linux Kernel Lab 8: Applying Best Practices for Security Software Management Lab 9: Applying Best Practices for Security Logging and Monitoring Lab 10: Defining Linux OS and Application Backup and Recovery Procedures (c) 2016, PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES - Click here to learn more: http: //www.issaseries.com/ The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Instructor Materials for Security Strategies in Linux Platforms and Applications include: PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking--putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well., Print Textbook & Cloud Lab Access: 180-day subscription. The cybersecurity Cloud Labs for Security Strategies in Linux Platforms and Applications provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones & Bartlett Learning textbooks, cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training. Labs: Lab 1: Installing a Core Linux Operating System on a ServerLab 2: Configuring Basic Security Controls on a Centos Linux ServerLab 3: Hardening Security with User Account Management and Security ControlsLab 4: Applying Hardened Linux File System Security ControlsLab 5: Hardening Security for Linux Services and ApplicationsLab 6: Hardening Security by Controlling AccessLab 7: Hardening Security for the Linux KernelLab 8: Applying Best Practices for Security Software ManagementLab 9: Applying Best Practices for Security Logging and MonitoringLab 10: Defining Linux OS and Application Backup and Recovery Procedures © 2016
LC Classification Number
QA76.76.O63J385 2016

Item description from the seller

About this seller

selak-5963

95.5% positive Feedback54 items sold

Joined Nov 2024
Usually responds within 24 hours

Detailed seller ratings

Average for the last 12 months
Accurate description
--
Reasonable postage costs
--
Postage speed
5.0
Communication
--

Seller feedback (20)

All ratings
Positive
Neutral
Negative