Search Books
Getting Started with Macaw:… Embedded Controllers: 80186…

Linux Firewalls: Enhancing Security with nftables and Beyond: Enhancing Security with nftables and Beyond (4th Edition)

Author Suehring, Steve
Publisher Addison-Wesley Professional
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
49.99 USD
🛒 Buy New on Amazon 🇺🇸

✓ In Stock.

Share:
Book Details
ISBN / ASIN0134000021
ISBN-139780134000022
AvailabilityIn Stock.
Sales Rank1,259,050
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

The Definitive Guide to Building Firewalls with Linux

 

As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security.

 

An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more.

 

Distribution neutral throughout, this edition is fully updated for today’s Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you’re a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise.

 

Inside, you’ll find just what you need to

  • Install, configure, and update a Linux firewall running either iptables or nftables
  • Migrate to nftables, or take advantage of the latest iptables enhancements
  • Manage complex multiple firewall configurations
  • Create, debug, and optimize firewall rules
  • Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions
  • Harden systems against port scanning and other attacks
  • Uncover exploits such as rootkits and backdoors with chkrootkit

 

Similar Products

Networking For Dummies
View
XML: A Beginner's Guide: Go Beyond the Basics with Aja…
View
Building Microsoft ASP.NET Applications for Mobile Dev…
View
Programming Java 2 Micro Edition for Symbian OS: A dev…
View
Excel 2010: The Missing Manual
View
Windows 8: Out of the Box
View
Technical Drawing 101: A Multidisciplinary Curriculum …
View
Embedded Linux Development Using Eclipse
View