Skip to Content
Security Strategies in Linux Platforms and Applications
book

Security Strategies in Linux Platforms and Applications

by Michael Jang
October 2010
Intermediate to advanced
512 pages
15h 1m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications

Chapter 15. Best Practices and Emerging Technologies

THIS CHAPTER IS IN MANY WAYS A RECAP. It incorporates many of the lessons of the previous 14 chapters to help you put best practices in place for various Linux systems and networks.

Security can be seen as a battle between black-hat hackers who want to break into computers and security professionals like you. As black-hat hackers find new ways to break through, open source developers will respond and find ways to block such attacks. It is then up to you to keep systems up to date to block such attacks.

Updates may not always work. In some cases, black-hat hackers may break into your systems before updates are available. In other cases, updates may cause problems for hardware. Some updates may ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications, 2nd Edition

Security Strategies in Linux Platforms and Applications, 2nd Edition

Michael Jang, Ric Messier

Publisher Resources

ISBN: 9780763791896