Hardening Apache
Download Hardening Apache PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Hardening Apache book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Hardening Apache
A must-read for any system administrator installing or currently using Apache, Hardening Apache shows you exactly what to do to make Apache more secure. Throughout this book, renowned author Tony Mobily introduces you to many of the security problems youll inevitably stumble across when using Apache—and most important, youll learn how to protect yourself and your server. Mobily provides in-depth instruction on the safe installation and configuration of Apache and gives detailed guidance on tightening the security of your existing Apache installation. This comprehensive book covers a wide variety of the most important issues, including common attacks, logging, downloading, administration, cross-site scripting attacks, and web-related RFC details. The book also delves into many of the more advanced system administration techniques including “jailing” Apache and securing third-party modules.
Hardening Apache
* Thorough coverage of Apache security * Accessible for both junior and senior level system administrators * This will be most up-to-date book on Apache Foreword and tech review by Ken Coar; one of the most respected people in the industry
Mastering Linux Security and Hardening
Author: Donald A. Tevault
language: en
Publisher: Packt Publishing Ltd
Release Date: 2023-02-28
Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threats Get With Your Book: PDF Copy, AI Assistant, and Next-Gen Reader Free Key Features Discover security techniques to prevent malware from infecting a Linux system, and detect it Prevent unauthorized people from breaking into a Linux system Protect important and sensitive data from being revealed to unauthorized persons Book DescriptionThe third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux. In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You’ll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you’ll get a peek at the new sudo features that have been added over the past couple of years. You’ll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you’ll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you’ll see how to use Security Onion to set up an Intrusion Detection System. By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise.What you will learn Prevent malicious actors from compromising a production Linux system Leverage additional features and capabilities of Linux in this new version Use locked-down home directories and strong passwords to create user accounts Prevent unauthorized people from breaking into a Linux system Configure file and directory permissions to protect sensitive data Harden the Secure Shell service in order to prevent break-ins and data loss Apply security templates and set up auditing Who this book is for This book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.