Logo

Securing and Optimizing Linux: The Ultimate Solution

Large book cover: Securing and Optimizing Linux: The Ultimate Solution

Securing and Optimizing Linux: The Ultimate Solution
by

Publisher: Open Network Architecture, Inc.
ISBN/ASIN: 0970033001
ISBN-13: 9780970033000
Number of pages: 876

Description:
This book is intended for a technical audience and system administrators who manage Linux servers, but it also includes material for home users and others. It discusses how to install and setup a Linux Server with all the necessary security and optimization for a high performance Linux specific machine. This book tries to be different by talking about only the essential and important information that the readers want to know by eliminating all the nonsense.

Download or read it online for free here:
Download link
(6.2MB, PDF)

Similar books

Book cover: Linux Security HOWTOLinux Security HOWTO
by - Linuxtopia
This document covers some of the main issues that affect Linux security. General philosophy and net-born resources are discussed. The document is not meant to be a up-to-date exploits document, it will tell you where to look for such information.
(8903 views)
Book cover: User Mode LinuxUser Mode Linux
by - Prentice Hall
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and test security.
(9911 views)
Book cover: Linux Network Administrator's Guide, 2nd EditionLinux Network Administrator's Guide, 2nd Edition
by - O'Reilly
This is a comprehensive reference for Linux network administration for both beginners and experienced network administrators. The book provides enough information to help you get your Linux network up and running and get you ready to learn more.
(16776 views)
Book cover: Step-by-Step Linux GuideStep-by-Step Linux Guide
by
This ebook describes the Linux system administration for people who know nothing about system administration. It describes real world mail, DNS, proxy, web, messaging, server configurations. The contents can be applied to any distribution.
(15801 views)