Hacking: 2 Books in 1 - Linux Systems and Linux for Beginners, A Practical Guide to Learn the Command Line and more .. Contributor(s): Davis, Robert (Author), Smith, Michael (Author) |
|
ISBN: 1801540977 ISBN-13: 9781801540971 Publisher: Mikcorp Ltd. OUR PRICE: $30.51 Product Type: Hardcover - Other Formats Published: December 2020 * Not available - Not in print at this time * |
Additional Information |
BISAC Categories: - Computers | Operating Systems - Unix - Computers | System Administration - Linux & Unix Administration - Computers | Operating Systems - Linux |
Physical Information: 0.88" H x 5.98" W x 9.02" (1.47 lbs) 372 pages |
Descriptions, Reviews, Etc. |
Publisher Description: Hacking Linux is an open source, as a result of which tool developers get an extra advantage. Due to its flexibility, most of the cybersecurity tools are written to run on Linux. . This can include software, hardware and data. In computing terms, security is not only cybersecurity but also physical security. Both these mechanisms are used to safeguard against any kind of unauthorized access to computerized systems and data centers. Any kind of information security which is designed to look after the integrity, confidentiality and availability of the data comes under cybersecurity. Linux is the OS which is used on most of the network devices as well as the security appliances like the routers, next-generation firewall devices, firewalls, virtual private network, unified threat management gateways, intrusion protection systems, intrusion detection systems, security information and event management appliances, wireless access point and a lot more. Also, to collect any kind of security-related data from all these devices or perform any kind of security hardening, Linux has to be understood. The goal of the eBook is simple: The eBook is a very good guide to know about the basics of Linux as well as its application in cybersecurity. - The basic of Linux - How networking command line works - What are the uses of logging for hackers - How to scan the server and the network - The process of hacking and how attackers cover their traces - The basic of cybersecurity - Protect yourself from cyber-attacks and secure your computer and other devices Would you like to know more? |