- Mastering Linux Security and Hardening
- Donald A. Tevault
- 116字
- 2021-07-02 19:19:19
Summary
So, we've made a good start to our journey into Linux security and hardening. In this chapter, we looked at why it's just as important to know about securing and hardening Linux systems as it is to know how to secure and harden Windows systems. We provided a few examples of how a poorly-configured Linux system can be compromised, and we mentioned that learning about Linux security could be good for your career. After that, we looked at how to set up a virtualized lab environment using VirtualBox and Cygwin.
In the next chapter, we'll look at locking down user accounts, and ensuring that the wrong people never get administrative privileges. I'll see you there.
推薦閱讀
- RESTful Java Web Services Security
- DevSecOps敏捷安全
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- API安全實(shí)戰(zhàn)
- Preventing Digital Extortion
- Computer Forensics with FTK
- 人工智能安全(精裝版)
- 黑客攻防從入門到精通
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- 黑客攻防從入門到精通:實(shí)戰(zhàn)篇(第2版)
- CPK通向賽博安全之路:理論與實(shí)踐CPK Solution to Cyber Security:Theory and Practice
- 大中型網(wǎng)絡(luò)入侵要案直擊與防御
- 計(jì)算機(jī)病毒揭秘與對(duì)抗
- 隱私計(jì)算與密碼學(xué)應(yīng)用實(shí)踐
- 零信任安全從入門到精通