Appendix 2. Other Books You May Enjoy
If you enjoyed this book, you may be interested in these other books by Packt:
Mastering Linux Security and Hardening Donald A. Tevault
ISBN: 978-1-78862-030-7
- Use various techniques to prevent intruders from accessing sensitive data
- Prevent intruders from planting malware, and detect whether malware has been planted
- Prevent insiders from accessing data that they aren’t authorized to access
- Do quick checks to see whether a computer is running network services that it doesn’t need to run
- Learn security techniques that are common to all Linux distros, and some that are distro-specific
Cybersecurity – Attack and Defense Strategies Yuri Diogenes, Erdal Ozkaya
ISBN: 978-1-78847-529-7
- Learn the importance of having a solid foundation for your security posture
- Understand the attack strategy using cyber security kill chain
- Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence
- Learn how to perform an incident investigation
- Get an in-depth understanding of the recovery process
- Understand continuous security monitoring and how to implement a vulnerability management strategy
- Learn how to perform log analysis to identify suspicious activities