Skip to main content

Security

  • Chapter
  • First Online:
Using and Administering Linux: Volume 3
  • 2336 Accesses

Abstract

In this chapter, you will learn

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Wikipedia, rsync, https://en.wikipedia.org/wiki/Rsync

  2. 2.

    Wikipedia, Hard Links, https://en.wikipedia.org/wiki/Hard_link

  3. 3.

    Both, David, DataBook for Linux, Using hard and soft links in the Linux filesystem, www.linux-databook.info/?page_id=5087

  4. 4.

    Web site, chkrootkit, www.chkrootkit.org

  5. 5.

    Web site, Root Kit Hunter, http://rkhunter.sourceforge.net/

  6. 6.

    Tripwire, https://www.tripwire.com

  7. 7.

    Opensource.com, A sysadmin’s guide to SELinux: 42 answers to the big questions, https://opensource.com/article/18/7/sysadmin-guide-selinux

  8. 8.

    Red Hat, Selinux User’s And Administrator’s Guide, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/selinux_users_and_administrators_guide/index

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 David Both

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Both, D. (2020). Security. In: Using and Administering Linux: Volume 3. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5485-1_16

Download citation

Publish with us

Policies and ethics