MbrlCatalogueTitleDetail

Do you wish to reserve the book?
Securing Linux on a Network
Securing Linux on a Network
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Securing Linux on a Network
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Securing Linux on a Network
Securing Linux on a Network

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Securing Linux on a Network
Book Chapter

Securing Linux on a Network

2015
Request Book From Autostore and Choose the Collection Method
Overview
This chapter provides a brief introduction to securing Linux on a network. It covers some of the basics, such as the OSI model, that you need in order to get started on this process. The chapter describes how you can set iptables firewall rules manually and use the iptables service directly, without the firewalled service. A wonderful tool to help you review your network services from a network standpoint is the nmap security scanner. The nmap utility is available in most Linux distribution repositories. Completely disabling an unused service is fine, but for needed network services, you must set up access control. This control can be accomplished, via the /etc/ hosts.allow and /etc/hosts.deny files, for selected services on Linux systems that incorporate TCP Wrapper support. Firewalls can be placed into different categories, depending upon their function. Each category has an important place in securing your server and network.
Publisher
John Wiley & Sons, Inc
ISBN
9781118999875, 1118999878