Jump to ratings and reviews
Rate this book

Security Strategies in Linux Platforms and Applications: .

Rate this book
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES - Click here to learn The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Instructor Materials for Security Strategies in Linux Platforms and Applications PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking―putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.

514 pages, Paperback

First published August 15, 2008

6 people are currently reading
20 people want to read

About the author

Michael Jang

58 books7 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
3 (33%)
4 stars
3 (33%)
3 stars
2 (22%)
2 stars
0 (0%)
1 star
1 (11%)
Displaying 1 of 1 review
Profile Image for Lara.
7 reviews
May 23, 2016
Do not buy the Kindle version of this book. The font/formatting is terrible. In some places it is unreadable. If you need an ebook, you're forced to rent the book from the manufacturer and it is entirely overpriced. The rental is the price of an outright purchase.

The book also constantly repeats itself chapter after chapter. Overall organization could be better.

And I hate, no loathe, the JBL labs that students are forced to buy with these books. They are overpriced for the content/skill level in said labs.

These publishers are a scam.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.