This book covers general Linux system security, perimeter (Internet-accessible) network security, and server-application security. Specific procedures, as well as tips for specific techniques and software tools, are discussed throughout, and differences between the Red Hat 7, SuSE 7, and Debian 2.2 GNU/Linux distributions are addressed in detail.
This book does not
cover the following
explicitly or in detail:
Linux distributions besides Red Hat, SuSE, and Debian, although with application security (which amounts to the better part of the book), this shouldn’t be a problem for users of Slackware, Turbolinux, etc.
Other open source operating systems such as OpenBSD (again, much of what is covered should be relevant, especially application security)
Applications that are inappropriate for or otherwise unlikely to be found on publicly accessible systems (e.g., SAMBA)
Desktop (non-networked) applications
Dedicated firewall systems (this book contains a subset of what is required to build a good firewall system)
Get Building Secure Servers with Linux now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.