Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
About This E-Book
Title Page
Copyright Page
Contents at a Glance
Table of Contents
About the Authors
Dedications
Acknowledgments
About the Technical Reviewers
We Want to Hear from You!
Reader Services
Introduction
Who Should Read This Book?
How This Book Is Organized
Part I: Introducing Linux
Chapter 1 Distributions and Key Components
Introducing Linux
Linux Distributions
Installing Linux
Summary
Chapter 2 Working on the Command Line
File Management
Shell Features
Advanced Commands
Summary
Chapter 3 Getting Help
Man Pages
Command Help Options
The help Command
The info Command
The /usr/share/doc Directory
Internet Resources
Summary
Chapter 4 Editing Files
The vi Editor
Additional Editors
Summary
Chapter 5 When Things Go Wrong
The Science of Troubleshooting
Notifying Users
Summary
Part II: User and Group Accounts
Chapter 6 Managing Group Accounts
What Are Groups Used For?
Managing Groups
Summary
Chapter 7 Managing User Accounts
The Importance of User Accounts
Managing Users
Network-Based User Accounts
Using su and sudo
Restricting User Accounts
Summary
Chapter 8 Develop an Account Security Policy
Introducing Kali Linux
Security Principles
Creating a Security Policy
Securing Accounts
Security Tools
Summary
Part III: File and Data Storage
Chapter 9 File Permissions
Standard Permissions
Default Permissions
Special Permissions
Access Control Lists (ACLs)
Changing Ownership
File Attributes
Introduction to SELinux
Summary
Chapter 10 Manage Local Storage: Essentials
Filesystem Essentials
Filesystem Types
Additional Filesystem Tools
Mounting Filesystems
Summary
Chapter 11 Manage Local Storage: Advanced Features
Encrypted Filesystems
Managing autofs
Logical Volume Manager
Disk Quotas
Hard and Soft Links
Summary
Chapter 12 Manage Network Storage
Samba
Network File System
Summary
Chapter 13 Develop a Storage Security Policy
Developing the Plan
Backing Up Data
Summary
Part IV: Automation
Chapter 14 crontab and at
Using crontab
Using at
Summary
Chapter 15 Scripting
Linux Programming
Basics of BASH Scripting
Flow Control Statements
User Interaction
Using Command Substitution
Additional Information
Summary
Chapter 16 Common Automation Tasks
Exploring Scripts that Already Exist on Your System
Creating Your Own Automation Scripts
Summary
Chapter 17 Develop an Automation Security Policy
Securing crontab and at
Securing BASH Scripts
Summary
Part V: Networking
Chapter 18 Networking Basics
Network Terminology
IPv4 Versus IPv6
IPv4 Addresses
Common Protocol Suites
Network Ports
Summary
Chapter 19 Network Configuration
Ethernet Network Interfaces
Persistent Network Configurations
Network Troubleshooting Commands
Access to Wireless Networks
Summary
Chapter 20 Network Service Configuration: Essential Services
DNS Servers
Zone Files
Securing BIND
DHCP Server
Email Servers
Managing Local Email Delivery
Remote Email Delivery
Summary
Chapter 21 Network Service Configuration: Web Services
Apache Web Server
Basic Apache Web Server Configuration
Apache Web Server Security
Virtual Hosts
HTTPS
SSL and Apache
Proxy Servers
Summary
Chapter 22 Connecting to Remote Systems
LDAP
FTP Servers
Secure Shell
Summary
Chapter 23 Develop a Network Security Policy
Kernel Parameters
TCP Wrappers
Network Time Protocol
Summary
Part VI: Process and Log Administration
Chapter 24 Process Control
Viewing Processes
Running Processes
Killing Processes
The nohup Command
Process Priority
Summary
Chapter 25 System Logging
Syslog
The logrotate Command
The journalctl Command
Summary
Part VII: Software Management
Chapter 26 Red Hat–Based Software Management
Red Hat Packages
Using the rpm Command
The yum Command
Additional Tools
Summary
Chapter 27 Debian-Based Software Management
Managing Packages with dpkg
Managing Packages with APT
Listing Package Information with APT Commands
Summary
Chapter 28 System Booting
Phases of the Boot Process
GRUB
Kernel Components
The init Phase
Summary
Chapter 29 Develop a Software Management Security Policy
Ensuring Software Security
xinetd
Summary
Part VIII: Security Tasks
Chapter 30 Footprinting
Understanding Footprinting
Common Footprinting Tools
Kali Linux Utilities
Summary
Chapter 31 Firewalls
Introduction to Firewalls
Essentials of the iptables Command
Using iptables to Filter Incoming Packets
Using iptables to Filter Outgoing Packets
Implementing NAT
Summary
Chapter 32 Intrusion Detection
Introduction to Intrusion Detection Tools
Intrusion Detection Network Tools
Intrusion Detection File Tools
Additional Intrusion Detection Tools
Summary
Chapter 33 Additional Security Tasks
The fail2ban Service
OpenVPN
gpg
Security Alert Services
Summary
Appendix A Answers to Review Questions
Appendix B Resource Guide
Glossary
Index
Code Snippets
← Prev
Back
Next →
← Prev
Back
Next →