October 2010
Intermediate to advanced
512 pages
15h 1m
English
BASIC ELEMENTS OF COMPUTER SECURITY begin in the server room. What you do there defines the additional steps required to secure servers, workstations, and more. Security is enhanced with developments in Trusted Computing Modules on motherboards. Such modules are compatible with open source principles. Physical security issues take another dimension on virtual machines.
Security issues continue with the boot process, as a black-hat hacker can use poorly configured boot systems and boot loaders to gain administrative access to your systems. Security issues continue with the kernel, as the developers behind Linux distributions include settings for a wide audience. Obscurity can help, as ...