Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

5 kirjaa tekijältä Kyle Rankin

Linux Hardening in Hostile Networks

Linux Hardening in Hostile Networks

Kyle Rankin

Addison Wesley
2017
nidottu
Implement Industrial-Strength Security on Any Linux Server In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker’s toolkit, you can’t rely on outdated security methods–especially if you’re responsible for Internet-facing services. In Linux® Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time. Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan. Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn’t protect against, and whether it would be useful in your environment. Apply core security techniques including 2FA and strong passwordsProtect admin workstations via lock screens, disk encryption, BIOS passwords, and other methodsUse the security-focused Tails distribution as a quick path to a hardened workstationCompartmentalize workstation tasks into VMs with varying levels of trustHarden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actionsEstablish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can’t be usedConfigure a software load balancer to terminate SSL/TLS connections and initiate new ones downstreamSet up standalone Tor services and hidden Tor services and relaysSecure Apache and Nginx web servers, and take full advantage of HTTPSPerform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewallsStrengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARCHarden DNS servers, deter their use in DDoS attacks, and fully implement DNSSECSystematically protect databases via network access control, TLS traffic encryption, and encrypted data storageRespond to a compromised server, collect evidence, and prevent future attacks Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.
Knoppix Pocket Reference

Knoppix Pocket Reference

Kyle Rankin

O'Reilly Media, Inc, USA
2005
nidottu
Knoppix is a portable Linux distribution replete with hundreds of valuable programs and utilities - a veritable Swiss Army knife in bootable CD form. It includes Linux software and desktop environments, automatic hardware detection and hundreds of other quality open source programs. Whether you're a system administrator or power user, you can use Knoppix for many different purposes. Knoppix boots and runs completely from a single CD so you don't need to install anything to your hard drive. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it. What you do need, however, is a comprehensive reference guide so you can benefit from all that Knoppix has to offer. The "Knoppix Pocket Reference" from O'Reilly fits the bill. This handy book shows you how to use Knoppix to troubleshoot and repair your computer, how to customize the Knoppix CD, running RAM memory checks, recovering data from a damaged hard drive, cloning hard drives, using Knoppix as a Terminal Server, using Knoppix as a kiosk OS, scanning for viruses on a Windows system, editing the Registry of a Windows system, and much more. If you want more information than the average Knoppix user, "Knoppix Pocket Reference" is an absolutely essential addition to your personal library.
Linux Multimedia Hacks

Linux Multimedia Hacks

Kyle Rankin

O'Reilly Media, Inc, USA
2005
nidottu
The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In "Linux Multimedia Hacks", author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment capabilities of your favorite OS. Included are tips and tricks for connecting to iPods, creating MP3s and Oggs, watching and making DVDs, turning your Linux box into a Tivo ala MythTV, and much more. You don't have to be a Linux server guru to make use of this book. "Linux Multimedia Hacks" takes the best of Linux's multimedia tools and with step-by-step instructions shows even novice users how to do cool and useful things with images, audio, and video. It includes entry level hacks that nearly all Linux users will want, such as installing codecs for audio and video playback and managing thousands of photographs. Later, you'll find hacks that cover a variety of advanced projects, from ripping and organizing media files with metatags, to editing video and audio tracks, to creating your own DVDs. Basic or advanced, each hack stands on its own, so you can feel free to jump around to only the sections that interest you. The book is divided into five easy-to-understand chapters: Images: tips range from basic image edits to automated image manipulation; Audio: hacks include audio format conversion and tweaking metadata within audio files; Video: learn how to covert between video formats, plus how to create your own VCDs and DVDs; Broadcast Media: tips include how to access and create you own web broadcasts as well as watch and record TV; and Web: learn how to make your multimedia creations available to the world. As one of the most powerful multimedia platforms around, Linux has far more capabilities and features than meets the eye. This latest Hacks book gives you the technical chops to enjoy them all.
The Best of Hack and /

The Best of Hack and /

Kyle Rankin

Lulu.com
2023
pokkari
Kyle Rankin wrote a monthly column titled "Hack and /" for Linux Journal magazine for almost 12 years starting in their January 2008 issue until Linux Journal closed for good on August 7, 2019. The column aimed to provide useful tips and tricks on topics ranging from system administration to security to 3D printing to VIM. After he published his final farewell article for Linux Journal, one of the most common questions he got was "what's going to happen to the giant archive of articles?" He realized he had a whole book's worth of material just in sysadmin tips alone. This book doesn't aim to be an exhaustive guide to everything you need to know to be a system administrator. Instead, this book allows Rankin to act as a remote mentor to someone starting out in IT or system administration whether as a full-time job or as a full stack developer. Think of each section in a chapter like sitting down with him over lunch or looking over his shoulder as he shows you a tip to save you time, a tool he found useful, a lesson he learned the hard way, or an explanation of how he'd tackle a project you got assigned. Table of Contents Chapter 1 Sysadmin 101 - The Importance of Learning IT Fundamentals - Leveling Up: A Sysadmin Career Path - Automation - Ticketing - Patch Management - Alerting - Preparing for Vacation - Travel Laptops Tips in Practice Chapter 2 Sysadmin's Toolbox - Filesystem Hierarchy Standard - Scheduling One-time Jobs with At - Sort and Uniq - Tracking Bandwidth with Iftop - Right Command, Wrong Server - Chopping Logs - Shorter Commands - Add Progress Bars to dd - Lock Files with the flock Command Chapter 3 Home Servers - Setting Up Your Network - Setting Up A Home DNS Server - A Local Mail Server - Clustering with Raspberry Pis - Home As Your Backup Data Center Chapter 4 Server Projects - Last Minute Secondary Mail Server - Check Exchange from the Command Line - Migrate to a New Hard Drive - Remotely Wipe a Server - Preseeding Full Disk Encryption - Localhost DNS Cache - PXE Magic - More PXE Magic Chapter 5 When Disaster Strikes - Stop Killing Your Cattle - Troubleshooting High Load - Troubleshooting the Local Network - Troubleshooting Remote Networks - Troubleshooting with Telnet - Collecting Server Metrics with Sar - Dynamic DNS Disaster - Troubleshoot Full Disks - Hard Drive Crashes - Recover the Master Boot Record - Restoring Deleted Files Appendices A My Favorite Infrastructure Sample Chapter: https: //kylerank.in/bohs_lacc_sample_chapter.pdf