Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
About This E-Book Title Page Copyright Page Contents at a Glance Table of Contents About the Authors Dedications Acknowledgments About the Technical Reviewers We Want to Hear from You! Reader Services Introduction
Who Should Read This Book? How This Book Is Organized
Part I: Introducing Linux
Chapter 1 Distributions and Key Components
Introducing Linux Linux Distributions Installing Linux Summary
Chapter 2 Working on the Command Line
File Management Shell Features Advanced Commands Summary
Chapter 3 Getting Help
Man Pages Command Help Options The help Command The info Command The /usr/share/doc Directory Internet Resources Summary
Chapter 4 Editing Files
The vi Editor Additional Editors Summary
Chapter 5 When Things Go Wrong
The Science of Troubleshooting Notifying Users Summary
Part II: User and Group Accounts
Chapter 6 Managing Group Accounts
What Are Groups Used For? Managing Groups Summary
Chapter 7 Managing User Accounts
The Importance of User Accounts Managing Users Network-Based User Accounts Using su and sudo Restricting User Accounts Summary
Chapter 8 Develop an Account Security Policy
Introducing Kali Linux Security Principles Creating a Security Policy Securing Accounts Security Tools Summary
Part III: File and Data Storage
Chapter 9 File Permissions
Standard Permissions Default Permissions Special Permissions Access Control Lists (ACLs) Changing Ownership File Attributes Introduction to SELinux Summary
Chapter 10 Manage Local Storage: Essentials
Filesystem Essentials Filesystem Types Additional Filesystem Tools Mounting Filesystems Summary
Chapter 11 Manage Local Storage: Advanced Features
Encrypted Filesystems Managing autofs Logical Volume Manager Disk Quotas Hard and Soft Links Summary
Chapter 12 Manage Network Storage
Samba Network File System Summary
Chapter 13 Develop a Storage Security Policy
Developing the Plan Backing Up Data Summary
Part IV: Automation
Chapter 14 crontab and at
Using crontab Using at Summary
Chapter 15 Scripting
Linux Programming Basics of BASH Scripting Flow Control Statements User Interaction Using Command Substitution Additional Information Summary
Chapter 16 Common Automation Tasks
Exploring Scripts that Already Exist on Your System Creating Your Own Automation Scripts Summary
Chapter 17 Develop an Automation Security Policy
Securing crontab and at Securing BASH Scripts Summary
Part V: Networking
Chapter 18 Networking Basics
Network Terminology IPv4 Versus IPv6 IPv4 Addresses Common Protocol Suites Network Ports Summary
Chapter 19 Network Configuration
Ethernet Network Interfaces Persistent Network Configurations Network Troubleshooting Commands Access to Wireless Networks Summary
Chapter 20 Network Service Configuration: Essential Services
DNS Servers Zone Files Securing BIND DHCP Server Email Servers Managing Local Email Delivery Remote Email Delivery Summary
Chapter 21 Network Service Configuration: Web Services
Apache Web Server Basic Apache Web Server Configuration Apache Web Server Security Virtual Hosts HTTPS SSL and Apache Proxy Servers Summary
Chapter 22 Connecting to Remote Systems
LDAP FTP Servers Secure Shell Summary
Chapter 23 Develop a Network Security Policy
Kernel Parameters TCP Wrappers Network Time Protocol Summary
Part VI: Process and Log Administration
Chapter 24 Process Control
Viewing Processes Running Processes Killing Processes The nohup Command Process Priority Summary
Chapter 25 System Logging
Syslog The logrotate Command The journalctl Command Summary
Part VII: Software Management
Chapter 26 Red Hat–Based Software Management
Red Hat Packages Using the rpm Command The yum Command Additional Tools Summary
Chapter 27 Debian-Based Software Management
Managing Packages with dpkg Managing Packages with APT Listing Package Information with APT Commands Summary
Chapter 28 System Booting
Phases of the Boot Process GRUB Kernel Components The init Phase Summary
Chapter 29 Develop a Software Management Security Policy
Ensuring Software Security xinetd Summary
Part VIII: Security Tasks
Chapter 30 Footprinting
Understanding Footprinting Common Footprinting Tools Kali Linux Utilities Summary
Chapter 31 Firewalls
Introduction to Firewalls Essentials of the iptables Command Using iptables to Filter Incoming Packets Using iptables to Filter Outgoing Packets Implementing NAT Summary
Chapter 32 Intrusion Detection
Introduction to Intrusion Detection Tools Intrusion Detection Network Tools Intrusion Detection File Tools Additional Intrusion Detection Tools Summary
Chapter 33 Additional Security Tasks
The fail2ban Service OpenVPN gpg Security Alert Services Summary
Appendix A Answers to Review Questions Appendix B Resource Guide Glossary Index Code Snippets
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion