EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book SELinux by Example

    Book Details:
  • Author : Frank Mayer
  • Publisher : Pearson Education
  • Release : 2006-07-27
  • ISBN : 0132704587
  • Pages : 476 pages

Download or read book SELinux by Example written by Frank Mayer and published by Pearson Education. This book was released on 2006-07-27 with total page 476 pages. Available in PDF, EPUB and Kindle. Book excerpt: SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included in the Linux 2.6 kernel—and delivered by default in Fedora Core, Red Hat Enterprise Linux, and other major distributions—it’s easier than ever to take advantage of its benefits. SELinux by Example is the first complete, hands-on guide to using SELinux in production environments. Authored by three leading SELinux researchers and developers, it illuminates every facet of working with SELinux, from its architecture and security object model to its policy language. The book thoroughly explains SELinux sample policies— including the powerful new Reference Policy—showing how to quickly adapt them to your unique environment. It also contains a comprehensive SELinux policy language reference and covers exciting new features in Fedora Core 5 and the upcoming Red Hat Enterprise Linux version 5. • Thoroughly understand SELinux’s access control and security mechanisms • Use SELinux to construct secure systems from the ground up • Gain fine-grained control over kernel resources • Write policy statements for type enforcement, roles, users, and constraints • Use optional multilevel security to enforce information classification and manage users with diverse clearances • Create conditional policies that can be changed on-the-fly • Define, manage, and maintain SELinux security policies • Develop and write new SELinux security policy modules • Leverage emerging SELinux technologies to gain even greater flexibility • Effectively administer any SELinux system

Book SELinux

    Book Details:
  • Author : Bill McCarty
  • Publisher : O'Reilly Media
  • Release : 2005
  • ISBN :
  • Pages : 262 pages

Download or read book SELinux written by Bill McCarty and published by O'Reilly Media. This book was released on 2005 with total page 262 pages. Available in PDF, EPUB and Kindle. Book excerpt: Offers a readable, practical introduction and step-by-step procedural manual for the installation, configuration, and use of SELinux, a kernel module and set of Linux programs developed by the National Security Agency to help protect computers running on Linux. Original. (All users).

Book SELinux System Administration

Download or read book SELinux System Administration written by Sven Vermeulen and published by Packt Publishing Ltd. This book was released on 2016-12-16 with total page 292 pages. Available in PDF, EPUB and Kindle. Book excerpt: Ward off traditional security permissions and effectively secure your Linux systems with SELinux About This Book Leverage SELinux to improve the secure state of your Linux system A clear approach to adopting SELinux within your organization Essential skills and techniques to help further your system administration career Who This Book Is For This book is for Linux administrators who want to control the secure state of their systems. It's packed with the latest information on SELinux operations and administrative procedures so you'll be able to further harden your system through mandatory access control (MAC) – a security strategy that has been shaping Linux security for years. What You Will Learn Analyze SELinux events and selectively enable or disable SELinux enforcement Manage Linux users and associate them with the right role and permission set Secure network communications through SELinux access controls Tune the full service flexibility by dynamically assigning resource labels Handle SELinux access patterns enforced through the system Query the SELinux policy in depth In Detail Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system's secure state across Linux distributions, helping you keep application vulnerabilities at bay. This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux. By the end of the book you will know how SELinux works and how you can tune it to meet your needs. Style and approach This book offers a complete overview of SELinux administration and how it integrates with other components on a Linux system. It covers the majority of SELinux features with a mix of real life scenarios, descriptions, and examples. This book contains everything an administrator needs to customize SELinux.

Book SELinux Cookbook

    Book Details:
  • Author : Sven Vermeulen
  • Publisher : Packt Publishing Ltd
  • Release : 2014-09-23
  • ISBN : 178398967X
  • Pages : 399 pages

Download or read book SELinux Cookbook written by Sven Vermeulen and published by Packt Publishing Ltd. This book was released on 2014-09-23 with total page 399 pages. Available in PDF, EPUB and Kindle. Book excerpt: If you are a Linux system administrator or a Linux-based service administrator and want to fine-tune SELinux to implement a supported, mature, and proven access control system, then this book is for you. Basic experience with SELinux enabled distributions is expected.

Book SELinux System Administration   Second Edition

Download or read book SELinux System Administration Second Edition written by Sven Vermeulen and published by . This book was released on 2017-01-31 with total page 285 pages. Available in PDF, EPUB and Kindle. Book excerpt: Ward off traditional security permissions and effectively secure your Linux systems with SELinuxAbout This Book* Leverage SELinux to improve the security of your Linux system* An easy-to-follow approach and instructions to help you adopt SELinux within your organization* Acquire key skills and techniques in your system administration careerWho This Book Is ForThis book is for both beginners as well as seasoned Linux administrators who want to control the secure state of their systems. Packed with the latest information on SELinux operations and administrative procedures, you will enjoy hardening your system further through the Mandatory Access Control system that has been shaping Linux' security for years.What You Will Learn* Analyse SELinux events and selectively enable or disable SELinux enforcement* Manage Linux users and associate them with the right role and permission set* Secure network communications through SELinux' access controls* Tune the full service flexibility by dynamically assigning resource labels* Handle SELinux' access patterns enforced through the system* Query the SELinux policy in depthIn DetailDo you have the daunting job of protecting your and your company's systems from malicious attacks and undefined application behaviour? Or are you looking to secure your Linux systems with improved access control? Well, look no further! This book gives you all the preliminary know-hows about enhancing your system's security across Linux distributions, helping you keep application vulnerabilities at bay.In this book, we describe the SELinux concepts and show you how to leverage SELinux to improve the secure state of a Linux system. You will learn not only about the fundamental SELinux concepts, but also about all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities, with genuine examples that you as administrators might come across. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SElinux.By the end of the book, you will know how SELinux works and how it can be tuned to your needs.

Book SELinux System Administration

Download or read book SELinux System Administration written by Sven Vermeulen and published by Packt Publishing Ltd. This book was released on 2013-09-24 with total page 179 pages. Available in PDF, EPUB and Kindle. Book excerpt: A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in Linux administration, especially Linux permission and user management.

Book CentOS Quick Start Guide

    Book Details:
  • Author : Shiwang Kalkhanda
  • Publisher : Packt Publishing Ltd
  • Release : 2018-12-26
  • ISBN : 1789341469
  • Pages : 313 pages

Download or read book CentOS Quick Start Guide written by Shiwang Kalkhanda and published by Packt Publishing Ltd. This book was released on 2018-12-26 with total page 313 pages. Available in PDF, EPUB and Kindle. Book excerpt: A concise walk-through of CentOS 7, starting from installation to securing it’s environment. Key FeaturesNo previous Linux environment experience needed for reading this bookGet comfortable with a popular and stable Red Hat Enterprise Linux distributionMost of the command line based concepts are explained with graphicsBook Description Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions. This book will introduce you to essential Linux skills using CentOS 7. It describes how a Linux system is organized, and will introduce you to key command-line concepts you can practice on your own. It will guide you in performing basic system administration tasks and day-to-day operations in a Linux environment. You will learn core system administration skills for managing a system running CentOS 7 or a similar operating system, such as RHEL 7, Scientific Linux, and Oracle Linux. You will be able to perform installation, establish network connectivity and user and process management, modify file permissions, manage text files using the command line, and implement basic security administration after covering this book. By the end of this book, you will have a solid understanding of working with Linux using the command line. What you will learnUnderstand file system hierarchy and essential command-line skillsUse Vi editor, I/O redirections and how to work with common text manipulating toolsCreate, delete, modify user accounts and manage passwords and their aging policyManage file ownership, permissions, and ACLExecute process management and monitoring on the command lineValidate and manage network configuration using nmcliManage remote logins using SSH and file transfer using SCP and RsyncUnderstand system logging, how to control system services with systemd and systemctl, and manage firewalIdWho this book is for Any individual who wants to learn how to use Linux as server or desktop in his environment. Whether you are a developer, budding system administrator, or tech lover with no previous Linux administration background, you will be able to start your journey in Linux using CentOS 7 with this book.

Book Enterprise Cloud Security and Governance

Download or read book Enterprise Cloud Security and Governance written by Zeal Vora and published by Packt Publishing Ltd. This book was released on 2017-12-29 with total page 406 pages. Available in PDF, EPUB and Kindle. Book excerpt: Build a resilient cloud architecture to tackle data disasters with ease About This Book Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform Practical examples to ensure you secure your Cloud environment efficiently A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Who This Book Is For If you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial. What You Will Learn Configure your firewall and Network ACL Protect your system against DDOS and application-level attacks Explore cryptography and data security for your cloud Get to grips with configuration management tools to automate your security tasks Perform vulnerability scanning with the help of the standard tools in the industry Learn about central log management In Detail Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. Style and approach This book follows a step-by-step, practical approach to secure your applications and data when they are located remotely.

Book Embedded Linux Development Using Yocto Project Cookbook

Download or read book Embedded Linux Development Using Yocto Project Cookbook written by Alex González and published by Packt Publishing Ltd. This book was released on 2018-01-25 with total page 449 pages. Available in PDF, EPUB and Kindle. Book excerpt: Over 79 hands-on recipes for professional embedded Linux developers to optimize and boost their Yocto Project know-how Key Features Optimize your Yocto setup to speed up development and debug build issues Use what is quickly becoming the standard embedded Linux product builder framework—the Yocto Project Recipe-based implementation of best practices to optimize your Linux system Book Description The Yocto Project has become the de facto distribution build framework for reliable and robust embedded systems with a reduced time to market.You'll get started by working on a build system where you set up Yocto, create a build directory, and learn how to debug it. Then, you'll explore everything about the BSP layer, from creating a custom layer to debugging device tree issues. In addition to this, you’ll learn how to add a new software layer, packages, data, scripts, and configuration files to your system. You will then cover topics based on application development, such as using the Software Development Kit and how to use the Yocto project in various development environments. Toward the end, you will learn how to debug, trace, and profile a running system. This second edition has been updated to include new content based on the latest Yocto release. What you will learn Optimize your Yocto Project setup to speed up development and debug build issues Use Docker containers to build Yocto Project-based systems Take advantage of the user-friendly Toaster web interface to the Yocto Project build system Build and debug the Linux kernel and its device trees Customize your root filesystem with already-supported and new Yocto packages Optimize your production systems by reducing the size of both the Linux kernel and root filesystems Explore the mechanisms to increase the root filesystem security Understand the open source licensing requirements and how to comply with them when cohabiting with proprietary programs Create recipes, and build and run applications in C, C++, Python, Node.js, and Java Who this book is for If you are an embedded Linux developer with the basic knowledge of Yocto Project, this book is an ideal way to broaden your knowledge with recipes for embedded development.

Book Fedora Linux

    Book Details:
  • Author : Chris Tyler
  • Publisher : "O'Reilly Media, Inc."
  • Release : 2006-10-20
  • ISBN : 0596555067
  • Pages : 658 pages

Download or read book Fedora Linux written by Chris Tyler and published by "O'Reilly Media, Inc.". This book was released on 2006-10-20 with total page 658 pages. Available in PDF, EPUB and Kindle. Book excerpt: "Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros." -- Behdad Esfahbod, Fedora developer This book will get you up to speed quickly on Fedora Linux, a securely-designed Linux distribution that includes a massive selection of free software packages. Fedora is hardened out-of-the-box, it's easy to install, and extensively customizable - and this book shows you how to make Fedora work for you. Fedora Linux: A Complete Guide to Red Hat's Community Distribution will take you deep into essential Fedora tasks and activities by presenting them in easy-to-learn modules. From installation and configuration through advanced topics such as administration, security, and virtualization, this book captures the important details of how Fedora Core works--without the fluff that bogs down other books and help/how-to web sites. Instead, you can learn from a concise task-based approach to using Fedora as both a desktop and server operating system. In this book, you'll learn how to: Install Fedora and perform basic administrative tasks Configure the KDE and GNOME desktops Get power management working on your notebook computer and hop on a wired or wireless network Find, install, and update any of the thousands of packages available for Fedora Perform backups, increase reliability with RAID, and manage your disks with logical volumes Set up a server with file sharing, DNS, DHCP, email, a Web server, and more Work with Fedora's security features including SELinux, PAM, and Access Control Lists (ACLs) Whether you are running the stable version of Fedora Core or bleeding-edge Rawhide releases, this book has something for every level of user. The modular, lab-based approach not only shows you how things work-but also explains why--and provides you with the answers you need to get up and running with Fedora Linux. Chris Tyler is a computer consultant and a professor of computer studies at Seneca College in Toronto, Canada where he teaches courses on Linux and X Window System Administration. He has worked on systems ranging from embedded data converters to Multics mainframes.

Book Security Strategies in Linux Platforms and Applications

Download or read book Security Strategies in Linux Platforms and Applications written by Michael H. Jang and published by Jones & Bartlett Publishers. This book was released on 2017 with total page 538 pages. Available in PDF, EPUB and Kindle. Book excerpt: "The Second Edition of Security Strategies in Linux Platforms and Applications opens with a discussion of risks, threats, and vulnerabilities. Part 2 discusses how to take advantage of the layers of security and the modules associated with AppArmor and SELinux. Part 3 looks at the use of open source and proprietary tools when building a layered sec

Book Exploring SE for Android

Download or read book Exploring SE for Android written by William Confer and published by Packt Publishing Ltd. This book was released on 2015-02-24 with total page 214 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book is intended for developers and engineers with some familiarity of operating system concepts as implemented by Linux. A basic background in C code would be helpful. Their positions range from hobbyists wanting to secure their Android powered creations to OEM engineers building handsets to engineers of emerging areas where Android is seeing growth.

Book Red Hat RHCSA 8 Cert Guide

Download or read book Red Hat RHCSA 8 Cert Guide written by Sander van Vugt and published by Pearson IT Certification. This book was released on 2019-11-04 with total page 1174 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is the eBook version of the print title. Learn, prepare, and practice for Red Hat RHCSA 8 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master Red Hat RHCSA 8 EX200 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam-preparation tasks Practice with four unique practice tests Learn from two full hours of video training from the author’s Red Hat Certified System Administrator (RHCSA) Complete Video Course, 3rd Edition. Red Hat RHCSA 8 Cert Guide is a best-of-breed exam study guide. Leading Linux consultant, author, and instructor Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, including Basic system management: Installation, tools, file management, text files, RHEL8 connections, user/group management, permissions, and network configuration Operating running systems: Managing software, processes, storage, and advanced storage; working with systemd; scheduling tasks; and configuring logging Advanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scripting Managing network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; and accessing network storage

Book RHCSA Red Hat Enterprise Linux 8

Download or read book RHCSA Red Hat Enterprise Linux 8 written by Asghar Ghori and published by Asghar Ghori. This book was released on 2020-01-10 with total page 559 pages. Available in PDF, EPUB and Kindle. Book excerpt: > Covers Red Hat Enterprise Linux 8 > Covers ALL official exam objectives for the RHCSA exam based on Red Hat Enterprise Linux 8 > Equally good for self-study and in-class training > 81 Step-by-Step exercises > 70 Do-It-Yourself Challenge Labs > 375 Check Your Understanding Questions & Answers > Concepts explained with diagrams > Commands and options summarized in tables > Exam tips included > 4 Unique Sample RHCSA Exams This book has 21 chapters that are organized logically. It covers the topics on local RHEL 8 installation; initial interaction with the system and basic commands; compression and archiving; file editing and manipulation; standard and special permissions; file searching and access controls; user monitoring and authentication files; users, groups, and password aging; bash shell features and startup files; processes and task scheduling; basic and advanced software administration techniques; system boot process and bootloader; kernel management and system initialization; logging and system tuning; basic and advanced storage management tools and solutions; local and remote file systems and swap regions; network device and connection configuration; time synchronization and hostname resolution; the secure shell service; and firewall and SELinux controls. Each chapter highlights the major topics and relevant exam objectives at the beginning, and ends with review questions & answers and Do-It-Yourself challenge labs. Throughout the book, figures, tables, screen shots, examples, and exam tips have been furnished to support explanation and exam preparation. This book includes four sample exams for RHCSA, which are expected to be done using the knowledge and skills attained from reading the material and practicing the exercises and challenge labs. The labs and the sample exams include references to relevant topics and/or exercises.

Book Red Hat RHCSA RHCE 7 Cert Guide

Download or read book Red Hat RHCSA RHCE 7 Cert Guide written by Sander van Vugt and published by Pearson IT Certification. This book was released on 2015-08-07 with total page 1856 pages. Available in PDF, EPUB and Kindle. Book excerpt: Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for exam success. Cert Guides are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. Master Red Hat RHCSA (EX200) and RHCE (EX300) exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks Test yourself with 4 practice exams (2 RHCSA and 2 RHCE) Gain expertise and knowledge using the companion website, which contains over 40 interactive exercises, 4 advanced CLI simulations, 40 interactive quizzes and glossary quizzes (one for each chapter), 3 virtual machines and more. Red Hat RHCSA/RHCE 7 Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending labs help you drill on key concepts you must know thoroughly. Red Hat RHCSA/RHCE 7, Premium Edition eBook and Practice Test focuses specifically on the objectives for the newest Red Hat RHCSA (EX200) and RHCE (EX300) exams reflecting Red Hat Enterprise Linux 7. Expert Linux trainer and consultant Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Well-regarded for its level of detail, assessment features, comprehensive design scenarios, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time. This study guide helps you master all the topics on the new RHCSA (EX200) and RHCE (EX300) exams, including Part 1: RHCSA Basic System Management: Installation, tools, text files, server connections; user, group, and permissions management; network configuration Operating Running Systems: Process management, VMs, package installation, task scheduling, logging, managing partitions and LVM logical volumes Advanced System Administration: Basic kernel management, basic Apache server configuration, boot procedures/troubleshooting Managing Network Services: Using Kickstart; managing SELinux; configuring firewalls, remote mounts, FTP, and time services Part 2: RHCE System Configuration/Management: External authentication/authorization, iSCSI SANs, performance reporting, optimization, logging, routing/advanced networking, Bash scripting System Security: Configuring firewalls, advanced Apache services, DNS, MariaDB, NFS, Samba, SMTP, SSH, and time synchronization

Book Docker in Practice  Second Edition

Download or read book Docker in Practice Second Edition written by Ian Miell and published by Simon and Schuster. This book was released on 2019-02-06 with total page 707 pages. Available in PDF, EPUB and Kindle. Book excerpt: Summary Docker in Practice, Second Edition presents over 100 practical techniques, hand-picked to help you get the most out of Docker. Following a Problem/Solution/Discussion format, you'll walk through specific examples that you can use immediately, and you'll get expert guidance on techniques that you can apply to a whole range of scenarios. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Docker's simple idea-wrapping an application and its dependencies into a single deployable container-created a buzz in the software industry. Now, containers are essential to enterprise infrastructure, and Docker is the undisputed industry standard. So what do you do after you've mastered the basics? To really streamline your applications and transform your dev process, you need relevant examples and experts who can walk you through them. You need this book. About the Book Docker in Practice, Second Edition teaches you rock-solid, tested Docker techniques, such as replacing VMs, enabling microservices architecture, efficient network modeling, offline productivity, and establishing a container-driven continuous delivery process. Following a cookbook-style problem/solution format, you'll explore real-world use cases and learn how to apply the lessons to your own dev projects. What's inside Continuous integration and delivery The Kubernetes orchestration tool Streamlining your cloud workflow Docker in swarm mode Emerging best practices and techniques About the Reader Written for developers and engineers using Docker in production. About the Author Ian Miell and Aidan Hobson Sayers are seasoned infrastructure architects working in the UK. Together, they used Docker to transform DevOps at one of the UK's largest gaming companies. Table of Contents PART 1 - DOCKER FUNDAMENTALS Discovering Docker Understanding Docker: Inside the engine room PART 2 - DOCKER AND DEVELOPMENT Using Docker as a lightweight virtual machine Building images Running containers Day-to-day Docker Configuration management: Getting your house in order PART 3 - DOCKER AND DEVOPS Continuous integration: Speeding up your development pipeline Continuous delivery: A perfect fit for Docker principles Network simulation: Realistic environment testing without the pain PART 4 - ORCHESTRATION FROM A SINGLE MACHINE TO THE CLOUD A primer on container orchestration The data center as an OS with Docker Docker platforms PART 5 - DOCKER IN PRODUCTION Docker and security Plain sailing: Running Docker in production Docker in production: Dealing with challenges

Book Red Hat Linux Networking and System Administration

Download or read book Red Hat Linux Networking and System Administration written by Terry Collings and published by *Red Hat. This book was released on 2004-02-20 with total page 1012 pages. Available in PDF, EPUB and Kindle. Book excerpt: * Updated to cover Red Hat Linux Enterprise Workstation with the latest on advanced Linux kernel features, the Tux Web server, the latest Apache 2.x Web server, and the expanded suite of custom configuration tools * Starts with network planning and Red Hat installation and configuration, then progresses to optimizing network and Internet services and monitoring and maintaining the network * Examines the basics of Red Hat Linux security and offers trouble-shooting and problem-solving advice * Includes important new chapters that focus on optimizing standard network services, such as file and print services, and Internet-related servers, such as the Apache Web server Copyright © 2004 by Red Hat, Inc. Material from Chapters 4-6, 8-10, 17 and 21 may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).