advertisment

advertisment

Linux Firewalls: Enhancing Security with nftables and Beyond

2,487

- Advertisement -

Linux Firewalls: Enhancing Security with nftables and Beyond

The book Linux Firewalls: Enhancing Security with nftables and Beyond is an essential reading resource for any Linux administrator dealing with Linux security topics. This guide provides comprehensive content on iptables and nftables and is updated with the new Linux kernels and includes code samples and scripts for Redhat, Fedora, Debian, and Ubuntu. If you are an expert in Linux, it will help you gain a security understanding of any Linux system for different networks, from a small home network to large enterprise networks. This book covers the following topics:

  • Install, configure, and update a Linux firewall that runs iptables or nftables.
  • Migrate to nftables, or use the latest iptables enhancements
  • Manage multiple complex firewall settings
  • Create, debug, and optimize firewall rolls
  • Use Smhain and other tools to protect file system integrity, network monitoring, and intrusion detection
  • Hardware systems against port scanning and other attacks
  • Discover exploitssuch as rootkitsand backdoorswith Chkrootkit

- Advertisement -

Headlines:

Part I: Packet Filtering and Basic Security Measures

Chapter 1: Preliminary Concepts Underlying Packet-Filtering Firewalls

Chapter 2: Packet-Filtering Concepts

Chapter 3: iptables : The Legacy Linux Firewall Administration Program

Chapter 4: nftables : The Linux Firewall Administration Program

Chapter 5: Building and Installing a Standalone Firewall

Part II: Advanced Issues, Multiple Firewalls, and Perimeter Networks

Chapter 6:  Firewall Optimization

Chapter 7:  Packet Forwarding

Chapter 8:  NAT–Network Address Translation

- Advertisement -

Chapter 9: Debugging the Firewall Rules

Chapter 10: Virtual Private Networks

Part III: Beyond iptables and nftables

Chapter 11: Intrusion Detection and Response

Chapter 12:  Intrusion Detection Tools

Chapter 13:  Network Monitoring and Attack Detection

Chapter 14:  Filesystem Integrity

Specifications:

Author: Steve Suehring

Publisher: Addison-Wesley Professional

Year of release: 2015

Number of Pages: 424

File size: 2.01MB

Dowload
80%
Awesome
  • Design

- Advertisement -

- Advertisement -

- Advertisement -

Leave A Reply

Your email address will not be published.