MARC details
| 000 -LEADER |
| fixed length control field |
03264nam a2200325 i 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CSPC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250911150110.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
250911s2023 -uka 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781837630516 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
CSPC |
| Language of cataloging |
eng |
| Transcribing agency |
CSPC |
| Description conventions |
rda |
| 050 04 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.76.O63 |
| Item number |
T483 2023 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Item number |
T299m |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Tevault, Donald A., |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Mastering linux security and hardening : |
| Remainder of title |
a practical guide to protecting your linux system from cyber attacks / |
| Statement of responsibility, etc. |
Donald A. Tevault. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
Third edition. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Birmingham, UK : |
| Name of producer, publisher, distributor, manufacturer |
Packt Publishing, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2023. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiv, 589 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 490 0# - SERIES STATEMENT |
| Series statement |
Expert insight |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Section I: Setting up a secure Linux system -- Running Linux in a virtual environment -- Securing administrative user accounts -- Securing normal user accounts -- Securing your server with a firewall - part 1 -- Securing your server with a firewall - part 2 -- Encryption technologies -- SSH hardening -- Section II: Mastering file and directory access control (DAC) -- Mastering discretionary access control -- Access control lists and shared directory management -- Section III: Advanced system hardening techniques -- Implementing mandatory access control with SELinux and AppArmor -- Kernel hardening and process isolation -- Scanning, auditing, and hardening -- Logging and log security -- Vulnerability scanning and intrusion detection -- Prevent unwanted programs from running -- Security tips and tricks for the busy bee. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"The third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux. In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You'll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you'll get a peek at the new sudo features that have been added over the past couple of years. You'll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you'll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you'll see how to use Security Onion to set up an Intrusion Detection System. By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise." |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security |
| General subdivision |
Standards. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Linux. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Suppress in OPAC |
No |
| Koha item type |
Books |
| Classification part |
005.8 |
| Item part |
T299m |
| Call number prefix |
GRD |
| Call number suffix |
2023 |