October 2010
Intermediate to advanced
512 pages
15h 1m
English
AS A LINUX EXPERT, you already know how to set up partitions, logical volumes, and redundant array of independent disks (RAID) systems. You know how to configure those systems on selected directories. You know how to format those filesystems. But there are choices that can enhance security or at least limit the risk to important data. These choices relate to how such volumes are organized, how they're mounted, and how they're formatted. Of course, encryption of such filesystems can also enhance security.
While file and folder permissions are basic to Linux, they are the starting point for security on Linux. You'll examine those permissions when they're local and when they're mounted from remote systems. ...