Learn how to attack and defend the world’s most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction.
The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker’s tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems.
- Master hacking tools and launch sophisticated attacks: perform SQL injections, deploy multiple server exploits and crack complex passwords.
- Defend systems and networks: make your servers invisible, be confident of your security with penetration testing and repel unwelcome attackers.
- Increase your background knowledge of attacks on systems and networks and improve all-important practical skills required to secure any Linux server.
The techniques presented apply to almost all Linux distributions including the many Debian and Red Hat derivatives and some other Unix-type systems. Further your career with this intriguing, deeply insightful, must-have technical book. Diverse, broadly-applicable and hands-on practical, Linux Server Security: Hack and Defend is an essential resource which will sit proudly on any techie's bookshelf.
Keywords: Linux Server Security: Hack and Defend: Linux Server Security, Christopher H. Binnie, Linux security, Linux Sysadmin, Linux DevOps, troubleshooting Linux security, Linux server offensive security, Linux server defensive security, combating Linux attacks, Linux security tools, Red Hat security, Ubuntu security, Linux security software, Linux penetration testing, Unix security, advanced Linux security techniques, common Linux security challenges, practical Linux security, invisible Linux server, Debian security, common Linux security scenarios, Linux Nmap, Linux Nping, Linux Kali, Linux sqlmap, Linux netcat, Networking / Security