- Paperback: 144 pages
- Publisher: Wiley; 1 edition (May 16, 2016)
- Language: English
- ISBN-10: 1119277655
- ISBN-13: 978-1119277651
- Product Dimensions: 7.4 x 0.3 x 9.2 inches
- Shipping Weight: 0.3 ounces (View shipping rates and policies)
- Average Customer Review: 14 customer reviews
- Amazon Best Sellers Rank: #1,399,844 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Linux Server Security: Hack and Defend 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who bought this item also bought
From the Back Cover
LEVERAGE LINUX STABILITY AND SECURITY FEATURES TO KEEP YOUR SYSTEM SAFE
Linux has become the most popular web server platform on the planet, which puts Linux security measures at the top of the priority list for every sysadminand every hacker. Linux has always been a hotbed of technology and developments in the security realm, with both offensive and defensive tools like knockd, netcat, Nmap, Nping, and others, but knowing how to exploit these tools the way a hacker would is becoming an increasingly essential part of keeping your system safe. Instead of chasing after the bad guy, learn to anticipate and block his every move.
Chris Binnie is a Linux veteran with server deployment experience in banking and government where security concerns are critical. Chris walks through challenging scenarios in a diverse array of security areas to demonstrate robust detection, prevention, and defensive techniques, providing the hard-won insight of experience every step of the way. These techniques apply across distributions, including Debian and Red Hat derivatives, and other Unix-type systems, and include the expert touches that make software packages work well with the operating system as well as with other packages. Linux enjoys a well-deserved reputation for bedrock stability, which is why it powers up to 70 percent of the Internet's public servers; this book provides the insight and skill set you need to keep it locked up tight.
Covering the hacker's favorite tools and biggest frustrations, Linux Server Security shows you how to:
- Make your server invisible without disrupting services in production
- Fingerprint files to monitor filesystems manually or automatically
- Turn hacker's favorite tools against them as part of your defense
- Learn how hackers identify your system's weak points
- Explore the possibilities of standard Nmap scripts
- Defend against malware and fight off a DDoS attack
- Discover how easily websites are compromised and passwords are cracked
About the Author
CHRIS BINNIE is a Technical Consultant with 20 years of experience working with Linux systems, and a writer for Linux Magazine and Admin Magazine. He built an Autonomous System Network in 2005, and served HD video to 77 countries via a media streaming platform that he architected and built. Over the course of his career, he has deployed many servers in the cloud and on banking and government server estates.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Additionally I think the publisher has let the author down in terms of book format and printing quality - the large-page format makes the manuscript seem very flimsy for the number of pages, and the cover finish quality was second-rate on the copy I received. This creates the impression, physically at least, that it's overpriced for the size/page combination. Anyway, if they ever produce a second edition, hopefully the writer can cover each section more thoroughly since the minimal content in the first print is very well written.
I was so underwhelmed by this book that if I had bought it, I would likely have return it because it provides very basic overview of these utilities. Each chapter is 3-4 pages and that includes a page that discusses history or background of how some of these utilities have evolved.
What I really do not like is the fact that it simply repeats the basic commands on each chapter, like yum install, to fill up half of the page. If you remove the history or background info, and the filler for repeated commands (yum, apt-get), this book would be even thinner so the actual substance in the book is really half of the 144 pages. That is very thin for a security book. When it introduces a new utility, like ncat, it does not go into any level of detail about it. So this book “introduces” new Linux admin to some of these utilities and how they can be used, but doesn’t go to the level of detail that intermediate to advanced Linux admins may expect.
You will likely read this book only once. In other words, this book is not written like a reference book that you like to keep on your bookshelf that you know you will likely keep going back to. As long as you remember some of the commands and the context in which they were used, you will likely never go back to this book, even if you were a Linux newbie.
Author Chris Binnie has taken a massive amount of information, almost all of which can be found on the internet and in other books, and done a hero’s work in organizing, condensing and distilling the information into a mere 121 pages of clearly written, adequately illustrated text. This is an excellent introduction to the issues of Linux network and server security for those with a need to know, but not an immediate need to function in an expert role.
The book is a uniquely informative primer for white hats. Unfortunately, because of the nature of things, it is also a basic how-to for black hats as well.
Binnie really does an excellent job of simplifying some topics to a point where they can be easily grasped by non-experts. Hooray for Chris Binnie!
Network security is a demanding job that most often the network people are going to lose if someone really wants to compromise the particular target.
I once worked with a client whose system had been compromised. I explained to the client that their network personnel had done a superb job of protecting the network from external threats. But an employee with a cell phone had compromised the network from inside, where the protection wasn’t as strong.
It will never happen, but I think everyone with any role in network operation should be required to actually study books like this until they get the message that the network is always at risk and part of their job is to protect the network.
This book is a good place to start.
This is NOT a comprehensive volume. Much of this information can he found online with a bit of Google. That isn't the point to me. This is a concise presentation intended to address a problem and approach that will help the sys admin move beyond the resources of the book. For me getting started on an admin project is often the most difficult part of getting it done. These fairly easy starts to a number of topics for securing Linux servers provide just that.
At just 126 pages it might be easy to dismiss Linux Server Security Hack and Defend as not serious compared to a 500 pages book on the same topic. But they do not have the same goals. This book's concise presentation is not as intimidating as those big volumes can be. He intends the reader go beyond the information presented in this book and build on it using the resources on the web.
In conclusion Binnie set out his goal in the introduction and the book follows that vision. This slim volume won't make someone a Linux Server security expert or build up a sys admin from ground zero. It will help a sys admin get started on important work understanding some popular threats and securing Linux servers better while becoming better able to build upon the kick-start provided in the concise chapter.
It's not for everyone, but states it's sys admin audience clearly. I think it's a nice light no-nonsense resource for time-pressed Linux sys admins and gets a solid 5 stars from me.