October 2010
Intermediate to advanced
512 pages
15h 1m
English
THIS CHAPTER IS IN MANY WAYS A RECAP. It incorporates many of the lessons of the previous 14 chapters to help you put best practices in place for various Linux systems and networks.
Security can be seen as a battle between black-hat hackers who want to break into computers and security professionals like you. As black-hat hackers find new ways to break through, open source developers will respond and find ways to block such attacks. It is then up to you to keep systems up to date to block such attacks.
Updates may not always work. In some cases, black-hat hackers may break into your systems before updates are available. In other cases, updates may cause problems for hardware. Some updates may ...