Artículo: AMZ-B0FR95JZKZ

Linux Server Hardening & Security : A Practical Guide with SELinux, AppArmor, auditd, and fail2ban

Format:

Kindle

Hardcover

Kindle

Paperback

Detalles del producto
Disponibilidad
Sin stock
Peso con empaque
0.87 kg
Devolución
No
Condición
Nuevo
Producto de
Amazon
Viaja desde
USA

Sobre este producto
  • Linux Server Hardening & Security: A Practical Guide with SELinux, AppArmor, auditd, and fail2ban (2025+)What if your most critical Linux server was probed tonight—would it quietly resist or instantly fold? This book turns your Linux boxes into defensible, auditable, production-grade systems using the exact tools modern attackers hate: SELinux, AppArmor, auditd, fail2ban, eBPF, systemd sandboxing, nftables/firewalld, OpenSCAP, and Ansible.Why this book stands out (and sells itself to your CISO):Built for 2025 and beyond. Covers containers (Docker, Podman, Kubernetes), runtime eBPF monitoring (Falco/Tracee), and systemd hardening—in addition to rock-solid host baselines.Purely hands-on. Every chapter ships with ready-to-run commands, practice labs, checklists, and a full end-to-end hardening project (Nginx + PostgreSQL) you can deploy the same day.Beginner-friendly → Professional. A guided path that starts with SSH, sysctl, PAM, and firewalls—and levels you up to MAC policy tuning, compliance automation, and container security.Production-focused. Idempotent Ansible templates, OpenSCAP/CIS validation, and troubleshooting playbooks for real outages and noisy scans.Inside, you will build and verify:Host hardening that holds: SSH keys + MFA/TOTP, passwordless root lockout, kernel/sysctl protections, nftables default-deny rules.Mandatory Access Control done right: SELinux (RHEL/Rocky/Alma) and AppArmor (Ubuntu/Debian) in enforcing mode—with minimal, tuned policies.Visibility & prevention: auditd rules that prove who changed what, fail2ban jails that stop brute-force and bot traffic.Modern runtime defense: systemd sandboxing (NoNewPrivileges, SystemCallFilter), eBPF tracing and Falco alerts for suspicious syscalls and container breakouts.Container/Kubernetes security: AppArmor + seccomp profiles, dropped capabilities, read-only roots, Pod Security standards, and network policies.Compliance at scale: Ansible roles for repeatable deployment, OpenSCAP/Lynis scans mapped to CIS Benchmarks—with remediation that actually sticks.You’ll get:Practice Labs per chapter + one full-stack project to harden a live web/database stack end-to-end.Pro Checklists that double as on-call runbooks (baseline, SELinux, AppArmor, auditd, fail2ban, sysctl, containers).Appendix cookbooks: command references for SELinux, AppArmor, auditd/ausearch, fail2ban; quick-start templates for sysctl, nftables, PAM; Ansible playbooks you can drop into Git today.Covers the platforms you run: Ubuntu 22.04/24.04, Debian 12/13, RHEL/Rocky/Alma 9.x, Fedora—plus Docker, Podman, and Kubernetes.Who this is for: Sysadmins, DevOps/Platform engineers, SREs, security engineers, and ambitious learners who want practical, copy-and-paste hardening that passes audits and survives attacks.If you’re ready to stop “hoping it’s fine” and start proving it’s secure, open this book. Your servers won’t just be online—they’ll be locked down, monitored, and ready.

Sin stock

Seleccione otra opción o busque otro producto.

Este producto viaja de USA a tus manos en