Use this hands-on resource to help you make the necessary upgrades and take the essential steps to secure your Linux systems. Learn to plan and maintain an interative security strategy, navigate "soft issues," and much more.
Part I - Do These Seven Things First
Chapter 1 - Critical First Steps
Part II - Take It From The Top: The Systematic Hardening Process
Chapter 2 - Hardening Network Access: Disable Unnecessary Services
Chapter 3 - Installing Firewalls and Filters
Chapter 4 - Hardening Software Accessibility
Chapter 5 - Preparing for Disaster
Chapter 6 - Hardening Access Controls
Chapter 7 - Hardening Data Storage
Chapter 8 - Hardening Authentication and User Identity
Chapter 9 - Restricted Execution Environments
Chapter 10 - Hardening Communications
Part III - Once Is Never Enough!
Chapter 11 - Install Network Monitoring Software
Chapter 12 - Automatic Logfile Scanning
Chapter 13 - Patch Management and Monitoring
Chapter 14 - Self-Monitoring Tools
Part IV - How to Succeed at Hardening Linux
Chapter 15 - Budget Acquisition and Corporate Commitment to Security
Chapter 16 - Establishing a Security Campaign
CITEC File Hosting
**Hidden Content: To see this hidden content your post count must be 5 or greater.**