Skip to Content
Security Strategies in Linux Platforms and Applications
book

Security Strategies in Linux Platforms and Applications

by Michael Jang
October 2010
Intermediate to advanced
512 pages
15h 1m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications

Chapter 3. Basic Security: Facilities Through the Boot Process

BASIC ELEMENTS OF COMPUTER SECURITY begin in the server room. What you do there defines the additional steps required to secure servers, workstations, and more. Security is enhanced with developments in Trusted Computing Modules on motherboards. Such modules are compatible with open source principles. Physical security issues take another dimension on virtual machines.

Security issues continue with the boot process, as a black-hat hacker can use poorly configured boot systems and boot loaders to gain administrative access to your systems. Security issues continue with the kernel, as the developers behind Linux distributions include settings for a wide audience. Obscurity can help, as ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications, 2nd Edition

Security Strategies in Linux Platforms and Applications, 2nd Edition

Michael Jang, Ric Messier

Publisher Resources

ISBN: 9780763791896