Skip to Content
Security Strategies in Linux Platforms and Applications
book

Security Strategies in Linux Platforms and Applications

by Michael Jang
October 2010
Intermediate to advanced
512 pages
15h 1m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications

Chapter 5. Filesystems, Volumes, and Encryption

AS A LINUX EXPERT, you already know how to set up partitions, logical volumes, and redundant array of independent disks (RAID) systems. You know how to configure those systems on selected directories. You know how to format those filesystems. But there are choices that can enhance security or at least limit the risk to important data. These choices relate to how such volumes are organized, how they're mounted, and how they're formatted. Of course, encryption of such filesystems can also enhance security.

While file and folder permissions are basic to Linux, they are the starting point for security on Linux. You'll examine those permissions when they're local and when they're mounted from remote systems. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications, 2nd Edition

Security Strategies in Linux Platforms and Applications, 2nd Edition

Michael Jang, Ric Messier

Publisher Resources

ISBN: 9780763791896