Linux Hardening In Hostile Networks Server Security From Tls To Tor  at Meripustak

Linux Hardening In Hostile Networks Server Security From Tls To Tor

Books from same Author: Kyle Rankin

Books from same Publisher: Pearson India

Related Category: Author List / Publisher List


  • Retail Price: ₹ 560/- [ 0.00% off ]

    Seller Price: ₹ 560

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 0.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 0.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Kyle Rankin
    PublisherPearson India
    ISBN9789353061777
    Pages272
    BindingSoftcover
    LanguageEnglish
    Publish YearJanuary 2018

    Description

    Pearson India Linux Hardening In Hostile Networks Server Security From Tls To Tor by Kyle Rankin

    Rankin begins with a user-oriented guide to safeguarding your own personal data with PGP, Off-the-Record Messaging (OTR), Tor, and the Tails ""amnesic incognito"" live Linux distribution. Next, he guides you through setting up secured versions of the services you manage every day, including web, email, and database servers that communicate over TLS locked-down DNS servers with DNSSEC Tor servers, and hidden services.Each category of solution is presented in its own chapter, with techniques organized based on difficulty level, time commitment, and overall threat. In each case, Rankin begins with techniques any system administrator can quickly implement to protect against entry-level hackers. Next, he moves on to intermediate and advanced techniques intended to safeguard against sophisticated and knowledgeable attackers. An accompanying CDROM contains a full, pre-configured copy of the Tails live Linux distribution, making it simple for any sysadmin to bootstrap a highly-secure, privacy-protecting environment in minutes.