Chapter 15. Best Practices and Emerging Technologies
THIS CHAPTER IS IN MANY WAYS A RECAP. It incorporates many of the lessons of the previous 14 chapters to help you put best practices in place for various Linux systems and networks.
Security can be seen as a battle between black-hat hackers who want to break into computers and security professionals like you. As black-hat hackers find new ways to break through, open source developers will respond and find ways to block such attacks. It is then up to you to keep systems up to date to block such attacks.
Updates may not always work. In some cases, black-hat hackers may break into your systems before updates are available. In other cases, updates may cause problems for hardware. Some updates may ...
Get Security Strategies in Linux Platforms and Applications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.