Эротические рассказы

Linux Security Fundamentals. David Higby ClintonЧитать онлайн книгу.

Linux Security Fundamentals - David Higby Clinton


Скачать книгу
href="#ufa51ca8e-747a-4abf-a7d5-d12e0800f672">Digital Espionage Stolen Credentials Malware Network-Based Attacks Summary Back to the Basics Review Questions

      10  Chapter 3 Controlling Access to Your Assets Controlling Physical Access Controlling Network Access Controlling Software Sources Summary Back to the Basics Review Questions

      11  Chapter 4 Controlling Network Connections Understanding Network Architecture Auditing Networks Securing Networks Summary Back to the Basics Review Questions

      12  Chapter 5 Encrypting Your Data at Rest What Is Encryption? Encryption Usage Patterns Encryption Technologies Summary Back to the Basics Review Questions

      13  Chapter 6 Encrypting Your Moving Data Website Encryption Email Encryption Working with VPN Connections and Software Repositories Summary Back to the Basics Review Questions

      14  Chapter 7 Risk Assessment Conducting Open Source Intelligence Gathering Accessing Public Vulnerability Databases Conducting Vulnerability Scans Conducting Penetration Tests Summary Back to the Basics Review Questions

      15  Chapter 8 Configuring System Backups and Monitoring Why You Need to Get Backups Right the First Time Backup Types Multitier Backups Configuring Monitoring and Alerts Summary Back to the Basics Review Questions

      16  Chapter 9 Resource Isolation Design Patterns Configuring Network Firewalling Working with Sandbox Environments Controlling Local System Access Summary Back to the Basics Review Questions

      17  Appendix Answers to Review Questions Chapter 1: Using Digital Resources Responsibly Chapter 2: What are Vulnerabilities and Threats? Chapter 3: Controlling Access to Your Assets Chapter 4: Controlling Network Connections Chapter 5: Encrypting Your Data at Rest Chapter 6: Encrypting Your Moving Data Chapter 7: Risk Assessment Chapter 8: Configuring System Backups and Monitoring Chapter 9: Resource Isolation Design Patterns

      18  Index

      19  End User License Agreement

       List of Illustrations

      1 Chapter 3 Figure 3.1 The stages involved in booting a (Linux) computer using UEFIFigure 3.2 A typical account entry within a password managerFigure 3.3 The results of an email search of the HIBP databaseFigure 3.4 The results of a search of the HIBP database for a password stringFigure 3.5 Permission levels assigned to users and a user groupFigure 3.6 A simplified illustration of the contents of a TCP data packet including metadat...Figure 3.7 A typical network setup where a firewall device stands between the internet and ...Figure 3.8 An AWS EC2 security group permitting SSH and browser (HTTP) traffic into the res...

      2 Chapter 4 Figure 4.1 A typical example of IP address allocations within a private subnetFigure 4.2 A NAT server translating IP addresses and managing


Скачать книгу
Яндекс.Метрика