ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Networking / Vendor Specific

Linux Firewalls: Enhancing Security with nftables and Beyond

| £33.32 | €37.47 | Ca$54.06 | Au$53.35
by Steve Suehring
What is this?DRM-EPUB by download  |  $39.99
What is this?DRM-PDF by download  |  $39.99
add to wish list
Linux Firewalls: Enhancing Security with nftables and Beyond by Steve Suehring

The Definitive Guide to Building Firewalls with Linux

As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security.

An indispensable working resource for every Linux administrator concerned with security, this guide presents comprehensive coverage of both iptables and nftables. Building on the solid networking and firewalling foundation in previous editions, it also adds coverage of modern tools and techniques for detecting exploits and intrusions, and much more.

Distribution neutral throughout, this edition is fully updated for today's Linux kernels, and includes current code examples and support scripts for Red Hat/Fedora, Ubuntu, and Debian implementations. If you're a Linux professional, it will help you establish an understanding of security for any Linux system, and for networks of all sizes, from home to enterprise.

Inside, you'll find just what you need to

  • Install, configure, and update a Linux firewall running either iptables or nftables
  • Migrate to nftables, or take advantage of the latest iptables enhancements
  • Manage complex multiple firewall configurations
  • Create, debug, and optimize firewall rules
  • Use Samhain and other tools to protect filesystem integrity, monitor networks, and detect intrusions
  • Harden systems against port scanning and other attacks
  • Uncover exploits such as rootkits and backdoors with chkrootkit

To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
or call in the US toll free 1-888-866-9150 product ID: 676512

Ebook Details
Pages: 432
Size: 3.2 MB
Publisher: Addison-Wesley Professional
Date published:   2015
ISBN: 9780134000190 (DRM-EPUB)
9780134000169 (DRM-PDF)

DRM Settings
Copying:of 30 selections every 30 days allowed
Printing:of 30 pages every 30 days allowed
Read Aloud:  allowed

Territory Restrictions
This ebook will NOT be sold to customers with a billing address in:
Afghanistan, Algeria, Belarus, Bosnia and Herzegowina, Congo, Congo (The Democratic Republic of the), Cote D'Ivoire, Cuba, Indonesia, Iran (Islamic Republic of), Iraq, Korea (Democratic People's Republic of), Liberia, Libyan Arab Jamahiriya, Macedonia (The Former Yugoslav Republic of), Myanmar, Nigeria, Sudan, Syrian Arab Republic, Zimbabwe

This product is listed in the following categories:

Nonfiction > Computers > Operating Systems > Linux
Nonfiction > Computers > Networking > Vendor Specific

This author has products in the following categories:

Nonfiction > Computers > Internet > Browsers
Nonfiction > Computers > Programming Languages > CGI, Javascript, Perl, VBScript
Nonfiction > Computers > Internet > World Wide Web > Web Programming
Nonfiction > Computers > Operating Systems > UNIX
Nonfiction > Computers > Programming > Object Oriented Programming
Nonfiction > Computers
Nonfiction > Computers > Internet > Web Site Design
Nonfiction > Computers > Certification Guides
Nonfiction > Computers > Certification Guides > MCSE
Nonfiction > Computers > System Administration
Nonfiction > Computers > User Interfaces
Nonfiction > Computers > Operating Systems > Linux
Nonfiction > Computers > Networking > Vendor Specific

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016