Atjaunināt sīkdatņu piekrišanu

Security Strategies In Linux Platforms And Applications 2nd Revised edition [Mīkstie vāki]

  • Formāts: Paperback / softback, 514 pages, weight: 907 g
  • Izdošanas datums: 20-Oct-2015
  • Izdevniecība: Jones and Bartlett Publishers, Inc
  • ISBN-10: 1284090655
  • ISBN-13: 9781284090659
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 106,73 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 514 pages, weight: 907 g
  • Izdošanas datums: 20-Oct-2015
  • Izdevniecība: Jones and Bartlett Publishers, Inc
  • ISBN-10: 1284090655
  • ISBN-13: 9781284090659
Citas grāmatas par šo tēmu:
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES - Click here to learn more: http://www.issaseries.com/

The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system.

Instructor Materials for Security Strategies in Linux Platforms and Applications include:

PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts

About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinkingputting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.
Preface xix
Acknowledgments xxiii
Part One Linux Really Secure? 1(44)
Chapter 1 Security Threats to Linux
2(16)
The Origins of Linux
4(1)
Security in an Open Source World
5(3)
Linux Distributions
8(1)
The C-I-A Triad
9(2)
Linux as a Security Device
11(2)
Linux in the Enterprise
13(1)
Recent Security Issues
14(2)
Chapter Summary
16(1)
Key Concepts And Terms
16(1)
Chapter 1 Assessment
17(1)
Chapter 2 Basic Components of Linux Security
18(27)
Linux Security Relates to the Kernel
19(5)
The Basic Linux Kernel Philosophy
20(1)
Basic Linux Kernels
20(1)
Distribution-Specific Linux Kernels
21(1)
Custom Linux Kernels
21(3)
Linux Kernel Security Options
24(1)
Securing a System During the Boot Process
24(2)
Physical Security
24(1)
The Threat of the Live CD
24(1)
Boot Process Security
25(1)
More Boot Process Issues
25(1)
Virtual Physical Security
26(1)
Linux Security Issues Beyond the Basic Operating System
26(2)
Service Process Security
26(1)
Security Issues with the GUI
27(1)
Linux User Authentication Databases
28(2)
Protecting Files with Ownership, Permissions, and Access Controls
30(1)
Firewalls and Mandatory Access Controls in a Layered Defense
31(3)
Firewall Support Options
31(2)
Mandatory Access Control Support
33(1)
Protecting Networks Using Encrypted Communication
34(1)
Tracking the Latest Linux Security Updates
35(2)
Linux Security Updates for Regular Users
35(1)
Linux Security Updates for Home Hobbyists
35(1)
Linux Security Updates for Power Users
36(1)
Security Updates for Linux Administrators
36(1)
Linux Security Update Administration
37(1)
The Effect of Virtualization on Security
37(1)
Variations Between Distributions
38(4)
A Basic Comparison: Red Hat and Ubuntu
38(1)
More Diversity in Services
39(3)
Chapter Summary
42(1)
Key Concepts And Terms
43(1)
Chapter 2 Assessment
43(2)
Part Two Layered Security and Linux 45(266)
Chapter 3 Starting Off: Getting Up and Running
46(28)
Picking a Distribution
47(4)
Picking a Delivery Platform
51(7)
Physical System
52(1)
Virtual Machines
53(2)
Cloud Services
55(3)
Choosing a Boot Loader
58(3)
Linux Loader
58(1)
Grand Unified Boot Loader
59(2)
Services
61(7)
Runlevels
65(3)
Wrappers
68(1)
inetd and xinetd
68(2)
R-services
70(1)
Chapter Summary
71(1)
Key Concepts And Terms
72(1)
Chapter 3 Assessment
72(2)
Chapter 4 User Privileges and Permissions
74(30)
The Shadow Password Suite
75(6)
/etdpasswd
76(1)
/etc/group
76(1)
/etc./shadow
77(2)
/etc/gshadow
79(1)
Defaults for the Shadow Password Suite
79(2)
Shadow Password Suite Commands
81(1)
Available User Privileges
81(3)
Securing Groups of Users
84(1)
User Private Group Scheme
84(1)
Create a Special Group
84(1)
Configuring the Hierarchy of Administrative Privileges
85(5)
Administrative Privileges in Services
86(1)
The su and sg Commands
86(1)
Options with sudo and /etdsudoers
87(3)
Regular and Special Permissions
90(2)
The Set User ID Bit
90(1)
The Set Group ID Bit
91(1)
The Sticky Bit
92(1)
Tracking Access Through Logs
92(2)
Authorization Log Options
92(1)
Authorization Log Files
93(1)
Pluggable Authentication Modules
94(2)
The Structure of a PAM Configuration File
94(2)
PAM Configuration for Users
96(1)
Authorizing Access with the Polkit
96(2)
How the Polkit Works
97(1)
Polkit Concepts
97(1)
The Polkit and Local Authority
97(1)
Network User Verification Tools
98(2)
NIS If You Must
99(1)
LDAP Shares Authentication
100(1)
Best Practices: User Privileges and Permissions
100(2)
Chapter Summary
102(1)
Key Concepts And Terms
102(1)
Chapter 4 Assessment
102(2)
Chapter 5 Filesystems, Volumes, and Encryption
104(34)
Filesystem Organization
105(7)
Filesystem Basics
105(1)
The Filesystem Hierarchy Standard
106(2)
Good Volume Organization Can Help Secure a System
108(3)
Read-Only Mount Points
111(1)
How Options for Journals, Formats, and File Sizes Affect Security
112(2)
Partition Types
113(1)
The Right Format Choice
113(1)
Available Format Tools
114(1)
Using Encryption
114(6)
Encryption Tools
114(1)
Encrypted Files
115(3)
Encrypted Directories
118(1)
Encrypted Partitions and Volumes
119(1)
Local File and Folder Permissions
120(4)
Basic File Ownership Concepts
121(1)
Basic File-Permission Concepts
121(1)
Changing File Permissions
122(2)
Networked File and Folder Permissions
124(4)
NFS Issues
124(1)
Samba/CIFS Network Permissions
125(2)
Network Permissions for the vsftp Daemon
127(1)
Configuring and Implementing Quotas on a Filesystem
128(4)
The Quota Configuration Process
129(1)
Quota Management
130(1)
Quota Reports
131(1)
How to Configure and Implement Access Control Lists on a Filesystem
132(2)
Configure a Filesystem for ACLs
132(1)
ACL Commands
133(1)
Configure Files and Directories with ACLs
133(1)
Best Practices: Filesystems, Volumes, and Encryption
134(1)
Chapter Summary
135(1)
Key Concepts And Terms
136(1)
Chapter 5 Assessment
136(2)
Chapter 6 Securing Services
138(28)
Starting a Hardened System
140(5)
Service Management
145(9)
SysV 'nit
146(5)
Upstart
151(1)
Systemd
152(2)
Hardening Services
154(3)
Using Mandatory Access Controls
157(3)
Security Enhanced Linux
157(2)
AppArmor
159(1)
Servers Versus Desktops
160(1)
Protecting Against Development Tools
161(2)
Chapter Summary
163(1)
Key Concepts And Terms
164(1)
Chapter 6 Assessment
164(2)
Chapter 7 Networks, Firewalls, and More
166(44)
Services on Every TCP/IP Port
167(2)
Protocols and Numbers in /etc/services
168(1)
Protection by the Protocol and Number
168(1)
Obscurity and the Open Port Problem
169(2)
Obscure Ports
169(1)
Opening Obscure Open Ports
169(1)
Obscurity by Other Means
170(1)
Protect with TCP Wrapper
171(2)
What Services Are TCP Wrapped?
171(1)
Configure TCP Wrapper Protection
171(2)
Packet-Filtering Firewalls
173(14)
Basic Firewall Commands
174(9)
Firewalld
183(2)
A Firewall for the Demilitarized Zone
185(2)
A Firewall for the Internal Network
187(1)
Alternate Attack Vectors
187(4)
Attacks Through Nonstandard Connections
188(1)
Attacks on Scheduling Services
189(2)
Wireless-Network Issues
191(2)
Linux and Wireless Hardware
191(1)
Encrypting Wireless Networks
191(1)
Bluetooth Connections
192(1)
Security Enhanced Linux
193(9)
The Power of SELinux
194(1)
Basic SELinux Configuration
194(1)
Configuration from the Command Line
194(2)
The SELinux Administration Tool
196(1)
The SELinux Troubleshooter
197(1)
SELinux Boolean Settings
197(5)
Setting Up AppArmor Profiles
202(4)
Basic AppArmor Configuration
202(1)
AppArmor Configuration Files
202(1)
AppArmor Profiles
203(1)
AppArmor Access Modes
204(1)
Sample AppArmor Profiles
204(1)
AppArmor Configuration and Management Commands
204(2)
An AppArmor Configuration Tool
206(1)
Best Practices: Networks, Firewalls, and TCP/IP Communications
206(2)
Chapter Summary
208(1)
Key Concepts And Terms
208(1)
Chapter 7 Assessment
209(1)
Chapter 8 Networked Filesystems and Remote Access
210(33)
Basic Principles for Systems with Shared Networking Services
211(5)
Configure an NTP Server
212(1)
Install and Configure a Kerberos Server
212(1)
Basic Kerberos Configuration
213(2)
Additional Kerberos Configuration Options
215(1)
Securing NFS as If It Were Local
216(1)
Configure NES Kerberos Tickets
216(1)
Configure NFS Shares for Kerberos
216(1)
Keeping vsftp Very Secure
217(2)
Configuration Options for vsftp
217(2)
Additional vsftp Configuration Files
219(1)
Linux as a More Secure Windows Server
219(6)
Samba Global Options
220(4)
Samba as a Primary Domain Controller
224(1)
Making Sure SSH Stays Secure
225(5)
The Secure Shell Server
225(3)
The Secure Shell Client
228(1)
Create a Secure Shell Passphrase
228(2)
Basic Principles of Encryption on Networks
230(3)
Host-to-Host IPSec on Red Hat
231(1)
Host-to-Host IPSec on Ubuntu
231(2)
Network-to-Network IPSec on Red Hat
233(1)
Network-to-Network IPSec on Ubuntu
233(1)
Helping Users Who Must Use Telnet
233(2)
Persuade Users to Convert to SSH
234(1)
Install More Secure Telnet Servers and Clients
235(1)
Securing Modem Connections
235(1)
The Basics of RADIUS
236(1)
RADIUS Configuration Files
236(1)
Moving Away from Cleartext Access
236(3)
The Simple r s ync Solution
238(1)
E-mail Clients
238(1)
Best Practices: Networked Filesystems and Remote Access
239(2)
Chapter Summary
241(1)
Key Concepts And Terms
241(1)
Chapter 8 Assessment
242(1)
Chapter 9 Networked Application Security
243(35)
Options for Secure Web Sites with Apache
244(11)
The LAMP Stack
245(2)
Apache Modules
247(1)
Security-Related Apache Directives
248(3)
Configure Protection on a Web Site
251(1)
Configure a Secure Web site
252(1)
Configure a Certificate Authority
252(2)
mod_security
254(1)
Working with Squid
255(3)
Basic Squid Configuration
256(1)
Security-Related Squid Directives
257(1)
Limit Remote Access with Squid
258(1)
Protecting DNS Services with BIND
258(5)
The Basics of DNS on the Internet
258(1)
DNS Network Configuration
259(1)
Secure BIND Configuration
259(2)
A BIND Database
261(1)
DNS Targets to Protect
261(1)
Domain Name System Security Extensions
261(2)
Mail Transfer Agents
263(5)
Open Source sendmail
263(3)
The Postfix Alternative
266(1)
Dovecot for POP and IMAP
267(1)
More E-mail Services
268(1)
Using Asterisk
268(2)
Basic Asterisk Configuration
269(1)
Security Risks with Asterisk
269(1)
Limiting Printers
270(3)
Printer Administrators
271(1)
Shared Printers
271(1)
Remote Administration
271(1)
The CUPS Administrative Tool
272(1)
Protecting Time Services
273(1)
Obscuring Local and Network Services
273(1)
Best Practices: Networked Application Security
274(1)
Chapter Summary
275(1)
Key Concepts And Terms
276(1)
Chapter 9 Assessment
276(2)
Chapter 10 Kernel Security Risk Mitigation
278(33)
Distribution-Specific Functional Kernels
279(3)
Kernels by Architecture
280(1)
Kernels for Different Functions
281(1)
The Stock Kernel
282(3)
Kernel Numbering Systems
283(1)
Production Releases and More
283(1)
Download the Stock Kernel
284(1)
Stock Kernel Patches and Upgrades
284(1)
Managing Security and Kernel Updates
285(2)
Stock Kernel Security Issues
285(1)
Distribution-Specific Kernel Security Issues
286(1)
Installing an Updated Kernel
286(1)
Development Software for Custom Kernels
287(1)
Red Hat Kernel Development Software
287(1)
Ubuntu Kernel Development Software
288(1)
Kernel-Development Tools
288(11)
Before Customizing a Kernel
289(1)
Start the Kernel Customization Process
289(2)
Kernel Configuration Options
291(8)
Building Your Own Secure Kernel
299(5)
Download Kernel Source Code
300(1)
Download Ubuntu Kernel Source Code
300(1)
Download Red Hat Kernel Source Code
300(1)
Install Required Development Tools
301(1)
Navigate to the Directory with the Source Code
301(1)
Compile a Kernel on Ubuntu Systems
302(1)
Compile a Kernel on Red Hat Systems
302(1)
Compile a Stock Kernel
302(1)
Install the New Kernel and More
303(1)
Check the Boot Loader
303(1)
Test the Result
303(1)
Increasing Security Using Kernels and the /prod Filesystem
304(3)
Don't Reply to Broadcasts
304(1)
Protect from Bad ICMP Messages
305(1)
Protect from SYN Floods
305(1)
Activate Reverse Path Filtering
305(1)
Close Access to Routing Tables
306(1)
Avoid Source Routing
306(1)
Don't Pass Traffic Between Networks
307(1)
Log Spoofed, Source-Routed, and Redirected Packets
307(1)
Best Practices: Kernel Security Risk Mitigation
307(2)
Chapter Summary
309(1)
Key Concepts And Terms
309(1)
Chapter 10 Assessment
309(2)
Part Three Building a Layered Linux Security Strategy 311(160)
Chapter 11 Managing Security Alerts and Updates
312(37)
Keeping Up with Distribution Security
313(3)
Red Hat Alerts
314(1)
Red Hat Enterprise Linux
314(1)
CentOS Linux
314(1)
Fedora Core Linux
315(1)
Ubuntu Alerts
315(1)
Keeping Up with Application Security
316(4)
The OpenOffice.org Suite
317(1)
Web Browsers
317(1)
Adobe Applications
318(1)
Service Applications
318(2)
Antivirus Options for Linux Systems
320(3)
The Clam AntiVirus System
321(1)
AVG Antivirus
322(1)
The Kaspersky Antivirus Alternative
322(1)
SpamAssassin
322(1)
Detecting Other Malware
323(1)
Using Bug Reports
323(4)
Ubuntu's Launchpad
324(1)
Red Hat's Bugzilla
325(1)
Application-Specific Bug Reports
325(2)
Security in an Open Source World
327(2)
The Institute for Security and Open Methodologies
328(1)
The National Security Agency
328(1)
The Free Software Foundation
328(1)
User Procedures
329(1)
Deciding Between Automated Updates or Analyzed Alerts
329(2)
Do You Trust Your Distribution?
330(1)
Do You Trust Application Developers?
330(1)
Do You Trust Service Developers?
330(1)
Linux Patch Management
331(4)
Standard yum Updates
332(1)
Updates on Fedora
332(1)
Updates on Red Hat Enterprise Linux
333(1)
Standard apt -* Updates
333(2)
Options for Update Managers
335(4)
Configuring Automated Updates
335(2)
Automatic Red Hat Updates
337(1)
Pushing or Pulling Updates
338(1)
Local or Remote Repositories
338(1)
Configuring a Local Repository
338(1)
Commercial Update Managers
339(3)
The Red Hat Network
340(1)
Canonical Landscape
341(1)
Novell's ZENworks
341(1)
Open Source Update Managers
342(3)
Various apt -* Commands
342(1)
Various yum commands
343(2)
Red Hat Spacewalk
345(1)
Best Practices: Security Operations Management
345(1)
Chapter Summary
346(1)
Key Concepts And Terms
347(1)
Chapter 11 Assessment
347(2)
Chapter 12 Building and Maintaining a Security Baseline
349(27)
Configuring a Simple Baseline
350(4)
A Minimal Red Hat Baseline
351(2)
A Minimal Ubuntu Baseline
353(1)
Read-Only or Live Bootable Operating Systems
354(2)
Appropriate Read-Only Filesystems
355(1)
Live CDs and DVDs
356(1)
Keeping the Baseline Up to Date
356(3)
A Gold Baseline
357(2)
Baseline Backups
359(1)
Monitoring Local Logs
359(6)
The System and Kernel Log Services
359(4)
Logs from Individual Services
363(2)
Consolidating and Securing Remote Logs
365(3)
Default rsyslog Configuration
365(1)
The Standard rsyslog Configuration File
365(3)
Identifying a Baseline System State
368(3)
Collect a List of Packages
368(1)
Compare Files, Permissions, and Ownership
369(1)
Define the Baseline Network Configuration
370(1)
Collect Runtime Information
370(1)
Checking for Changes with Integrity Scanners
371(2)
Tripwire
371(1)
Advanced Intrusion Detection Environment
372(1)
Best Practices: Building and Maintaining a Secure Baseline
373(1)
Chapter Summary
374(1)
Key Concepts And Terms
374(1)
Chapter 12 Assessment
374(2)
Chapter 13 Testing and Reporting
376(42)
Testing Every Component of a Layered Defense
377(5)
Testing a Firewall
377(1)
Testing Various Services
378(3)
Testing Passwords
381(1)
Testing Mandatory Access Control Systems
382(1)
Checking for Open Network Ports
382(10)
The telnet Command
382(1)
The netstat Command
383(3)
The lsof Command
386(1)
The nmap Command
387(5)
Running Integrity Checks of Installed Files and Executables
392(6)
Verifying a Package
393(1)
Performing a Tripwire Check
394(1)
Testing with the Advanced Intrusion Detection Environment
395(3)
Ensuring that Security Does Not Prevent Legitimate Access
398(3)
Reasonable Password Policies
398(3)
Allowing Access from Legitimate Systems
401(1)
Monitoring Virtualized Hardware
401(3)
Virtual Machine Hardware
402(1)
Virtual Machine Options
402(1)
Monitoring the Kernel-Based Virtual Machine (KVM)
403(1)
Standard Open Source Security-Testing Tools
404(4)
Snort
405(2)
Netcat and the nc Command
407(1)
Vulnerability Scanners for Linux
408(4)
Nessus
408(2)
OpenVAS
410(1)
Nexpose
410(2)
Where to Install Security-Testing Tools
412(3)
Hint: Not Where Attackers Can Use Them Against You
412(1)
Some Tools Are Already Available on Live CDs
413(2)
Best Practices: Testing and Reporting
415(1)
Chapter Summary
416(1)
Key Concepts And Terms
416(1)
Chapter 13 Assessment
417(1)
Chapter 14 Detecting and Responding to Security Breaches
418(30)
Performing Regular Performance Audits
419(3)
The Basic Tools: ps and top
420(1)
The System Status Package
421(1)
For Additional Analysis
421(1)
Making Sure Users Stay Within Secure Limits
422(2)
Appropriate Policies
423(1)
Education
423(1)
User Installation of Problematic Services
424(1)
Logging Access into the Network
424(2)
Identifying Users Who Have Logged In
424(1)
System Authentication Logs
425(1)
Monitoring Account Behavior for Security Issues
426(1)
Downloaded Packages and Source Code
426(1)
Executable Files
426(1)
Creating an Incident Response Plan
427(6)
Increased Vigilance
428(1)
Should You Leave the System On?
428(1)
Acquiring the Memory Contents
429(4)
Having Live Linux CDs Ready for Forensics Purposes
433(4)
Helix Live Response
433(2)
SANS Investigative Forensics Toolkit
435(1)
Digital Evidence and Forensics Toolkit
435(1)
Build Your Own Media
435(1)
Forensic Live Media
436(1)
When You Put Your Plan into Action
437(2)
Confirming the Breach
437(1)
Identifying Compromised Systems
438(1)
Having Replacement Systems in Place
438(1)
Secure Backup and Recovery Tools
439(2)
Disk Images for Later Investigation
439(1)
The rsync Command
440(1)
Mount Encrypted Filesystems
440(1)
The Right Way to Save Compromised Data as Evidence
441(1)
Basic Principles for Evidence
441(1)
Remembering the Volatile Data
442(1)
Preserving the Hard Disks
442(1)
Disaster Recovery from a Security Breach
442(2)
Determining What Happened
443(1)
Prevention
443(1)
Replacement
443(1)
How and When to Share with the Open Source Community
444(1)
If the Security Issue Is Known
444(1)
If the Security Issue Has Not Been Reported
444(1)
Best Practices: Security Breach Detection and Response
445(1)
Chapter Summary
446(1)
Key Concepts And Terms
446(1)
Chapter 14 Assessment
447(1)
Chapter 15 Best Practices and Emerging Technologies
448(23)
Maintaining a Gold Baseline
449(2)
Monitoring Security Reports
450(1)
Working Through Updates
450(1)
Recalibrating System Integrity
450(1)
Ensuring Availability with Redundancy
451(2)
A Gold Physical Baseline
451(1)
A Gold Virtual Baseline Host
451(2)
Identifying Your Support Options
453(3)
Red Hat Support Options
454(1)
Canonical Support Options
455(1)
Open Source Community Support
455(1)
Checking Compliance with Security Policies
456(1)
User Security
456(1)
Administrator Security
456(1)
Keeping the Linux Operating System Up to Date
457(2)
Baseline Updates
457(1)
Functional Bugs
458(1)
New Releases
458(1)
Keeping Distribution-Related Applications Up to Date
459(2)
Server Applications
459(2)
Desktop Applications
461(1)
Managing Third-Party Applications
461(1)
Licensing Issues
461(1)
Support Issues
462(1)
Sharing Problems and Solutions with the Community
462(2)
Which Community?
462(1)
Sharing with Developers
463(1)
Sharing on Mailing Lists
464(1)
Testing New Components Before Putting Them into Production
464(2)
Testing Updates
465(1)
Documenting Results
465(1)
Beta Testing
466(1)
Keeping Up with Security on Your Systems
466(3)
A New Firewall Command
466(1)
More Mandatory Access Controls
466(1)
Penetration-Testing Tools
467(1)
Single Sign-On
468(1)
Incident Response
468(1)
Chapter Summary
469(1)
Key Concepts And Terms
470(1)
Chapter 15 Assessment
470(1)
Appendix A Answer Key 471(2)
Appendix B Standard Acronyms 473(4)
Glossary of Key Terms 477(14)
References 491(6)
Index 497
Michael Jang (RHCE, LPIC-2, UCP, Linux+, MCP) has been a freelance technical writer since 1998. He had previously worked for more than 10 years as a specialist engineer at Boeing Commercial Airplane Group. Michael has written white papers on new products and processes. Hes also the author of more than two-dozen IT books, including LPIC-1 In Depth (2009) and Ubuntu Server Administration Course (for VTC in 2009). Finally, Michael travels overseas extensively to troubleshoot IT issues and manage projects.

RIC MESSIER has been working with Unix and Unix-like operating systems since the mid-1980s. In the intervening decades, he has done system administration, network engineering, penetration testing, and programming; developed managed security services; and worked in operations security and a number of other jobs in between.Ric is a security professional who has worked with a number of companies from large Internet service providers to small software companies. He has run a small networking and security consulting practice for the last several years. Additionally, he has taught courses at both the graduate and undergraduate level. Currently, in addition to writing books and recording training videos, he is a Principal Consultant with Mandiant.'