Linux Security Fundamentals. David Higby Clinton
Чтение книги онлайн.

Читать онлайн книгу Linux Security Fundamentals - David Higby Clinton страница 3

СКАЧАТЬ 3 Figure 3.1 The stages involved in booting a (Linux) computer using UEFIFigure 3.2 A typical account entry within a password managerFigure 3.3 The results of an email search of the HIBP databaseFigure 3.4 The results of a search of the HIBP database for a password stringFigure 3.5 Permission levels assigned to users and a user groupFigure 3.6 A simplified illustration of the contents of a TCP data packet including metadat...Figure 3.7 A typical network setup where a firewall device stands between the internet and ...Figure 3.8 An AWS EC2 security group permitting SSH and browser (HTTP) traffic into the res...

      2 Chapter 4 Figure 4.1 A typical example of IP address allocations within a private subnetFigure 4.2 A NAT server translating IP addresses and managing traffic between local and pub...Figure 4.3 The Wireshark “home” screen showing links to all the networks available to the s...Figure 4.4 The results of a typical network scan shown in Wireshark

      3 Chapter 5 Figure 5.1 A typical symmetric encryption and decryption processFigure 5.2 The recipient’s public key is used to encrypt and later decrypt a file with the ...Figure 5.3 The sender’s public key is used to encrypt and later decrypt a file with the use...Figure 5.4 The step-by-step representation of a blockchain transaction

      4 Chapter 6 Figure 6.1 The successful SSL Report on the TLS configuration for the bootstrap-it.com webs...Figure 6.2 The conversation between a client browser and a TLS-powered web serverFigure 6.3 Installation instructions on the Certbot websiteFigure 6.4 A typical VPN running through a secure tunnel connection

      5 Chapter 7 Figure 7.1 The NVD DashboardFigure 7.2 A layered diagram of NVD-related tools

      6 Chapter 8 Figure 8.1 Some output from the dmesg command on a Linux Ubuntu 18.04 system. Exciting read...

      7 Chapter 9 Figure 9.1 Public-facing web servers are allowed fairly open access from public networks, w...Figure 9.2 A common dual-firewall DMZ setupFigure 9.3 A bastion host is a server placed within a DMZ through which remote admins can a...Figure 9.4 The VirtualBox network adapter configuration dialog box

      Guide

      1  Cover

      2  Table of Contents

      3  Introduction

      Pages

      1  i

      2  ii

      3  iii

      4  v

      5  xiii

      6  xiv

      7  xv

      8  1

      9  2

      10  3

      11  4

      12  5

      13  6

      14  7

      15  8

      16  9

      17  10

      18  11

      19 12

      20 13

      21  15

      22  16

      23  17

      24  18

      25 19

      26  20

      27  21

      28  22

      29  23

      30  24

      31  25

      32  26

      33  27

      34  28

      35 29

      36 30

      37 31

      38  33

      39  34

      40  35

      41  СКАЧАТЬ