Skip to Content
Security Strategies in Linux Platforms and Applications, 2nd Edition
book

Security Strategies in Linux Platforms and Applications, 2nd Edition

by Michael Jang, Ric Messier
October 2015
Intermediate to advanced
514 pages
16h 19m
English
Jones & Bartlett Learning
Content preview from Security Strategies in Linux Platforms and Applications, 2nd Edition

CHAPTER

5

Filesystems, Volumes, and Encryption

AS A LINUX EXPERT, you already know how to set up partitions, logical volumes, and redundant array of independent disks (RAID) systems. You know how to configure those systems on selected directories. You know how to format those filesystems. But there are choices that can enhance security or at least limit the risk to important data. These choices relate to how such volumes are organized, how they’re mounted, and how they’re formatted. Of course, encryption of such filesystems can also enhance security.

Although file and folder permissions are basic to Linux, they are the starting point for security on Linux. You’ll examine these permissions when they’re local and when they’re mounted ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Strategies in Linux Platforms and Applications

Security Strategies in Linux Platforms and Applications

Michael Jang

Publisher Resources

ISBN: 9781284090659