Search  for anything...

Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks

  • Based on 98 reviews
Condition: New
Checking for the best price...
$27.32 Why this price?
Save $22.67 was $49.99

Buy Now, Pay Later


As low as $6 / mo
  • – 4-month term
  • – No impact on credit to apply
  • – Instant approval decision
  • – Secure and straightforward checkout

Ready to go? Add this product to your cart and select a plan during checkout.

Payment plans are offered through our trusted finance partners Klarna, Affirm, Afterpay, Apple Pay, and PayTomorrow. No-credit-needed leasing options through Acima may also be available at checkout.

Learn more about financing & leasing here.

Free shipping on this product

FREE 30-day refund/replacement

To qualify for a full refund, items must be returned in their original, unused condition. If an item is returned in a used, damaged, or materially different state, you may be granted a partial refund.

To initiate a return, please visit our Returns Center.

View our full returns policy here.


Availability: Only 4 left in stock, order soon!
Fulfilled by Amazon

Arrives Monday, Mar 23
Order within 17 hours and 48 minutes
Available payment plans shown during checkout

Protection Plan Protect Your Purchase
Checking for protection plans...

Description

Gain a firm practical understanding of how to secure your Linux system from intruders, malware attacks, and other cyber threatsGet With Your Book: PDF Copy, AI Assistant, and Next-Gen Reader FreeKey FeaturesDiscover security techniques to prevent malware from infecting a Linux system, and detect itPrevent unauthorized people from breaking into a Linux systemProtect important and sensitive data from being revealed to unauthorized personsBook DescriptionThe third edition of Mastering Linux Security and Hardening is an updated, comprehensive introduction to implementing the latest Linux security measures, using the latest versions of Ubuntu and AlmaLinux.In this new edition, you will learn how to set up a practice lab, create user accounts with appropriate privilege levels, protect sensitive data with permissions settings and encryption, and configure a firewall with the newest firewall technologies. You’ll also explore how to use sudo to set up administrative accounts with only the privileges required to do a specific job, and you’ll get a peek at the new sudo features that have been added over the past couple of years. You’ll also see updated information on how to set up a local certificate authority for both Ubuntu and AlmaLinux, as well as how to automate system auditing. Other important skills that you’ll learn include how to automatically harden systems with OpenSCAP, audit systems with auditd, harden the Linux kernel configuration, protect your systems from malware, and perform vulnerability scans of your systems. As a bonus, you’ll see how to use Security Onion to set up an Intrusion Detection System.By the end of this new edition, you will confidently be able to set up a Linux server that will be secure and harder for malicious actors to compromise.What you will learnPrevent malicious actors from compromising a production Linux systemLeverage additional features and capabilities of Linux in this new versionUse locked-down home directories and strong passwords to create user accountsPrevent unauthorized people from breaking into a Linux systemConfigure file and directory permissions to protect sensitive dataHarden the Secure Shell service in order to prevent break-ins and data lossApply security templates and set up auditingWho this book is forThis book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.Table of ContentsRunning Linux in a Virtual EnvironmentSecuring Administrative User AccountsSecuring Normal User AccountsSecuring Your Server with a Firewall - Part 1Securing Your Server with a Firewall - Part 2Encryption TechnologiesSSH HardeningMastering Discretionary Access ControlAccess Control Lists and Shared Directory ManagementImplementing Mandatory Access Control with SELinux and AppArmorKernel Hardening and Process IsolationScanning, Auditing and HardeningLogging and Log SecurityVulnerability Scanning and Intrusion DetectionPrevent Unwanted Programs from RunningSecurity Tips & Tricks for the Busy Bee Read more

Publisher ‏ : ‎ Packt Publishing


Publication date ‏ : ‎ February 28, 2023


Edition ‏ : ‎ 3rd


Language ‏ : ‎ English


Print length ‏ : ‎ 618 pages


ISBN-10 ‏ : ‎ 1837630518


ISBN-13 ‏ : ‎ 16


Item Weight ‏ : ‎ 2.31 pounds


Dimensions ‏ : ‎ 7.5 x 1.4 x 9.25 inches


Best Sellers Rank: #53,949 in Books (See Top 100 in Books) #5 in Linux Programming #8 in Linux Networking & System Administration #22 in Computer Network Security


Frequently asked questions

If you place your order now, the estimated arrival date for this product is: Monday, Mar 23

Yes, absolutely! You may return this product for a full refund within 30 days of receiving it.

To initiate a return, please visit our Returns Center.

View our full returns policy here.

  • Klarna Financing
  • Affirm Pay in 4
  • Affirm Financing
  • Afterpay Financing
  • PayTomorrow Financing
  • Financing through Apple Pay
Leasing options through Acima may also be available during checkout.

Learn more about financing & leasing here.

Top Amazon Reviews


  • Must have rerference and guide point.
Format: Paperback
I have purchased quite a few too many books over the years online after reading reviews and often find out the content is shallow and lacking any depth for a technical volume. I have a back ground of ~7yrs in Security Engineering spaning many domains- I found this book an excellent "read" and phenomenal reference resource. You can absolutely tell the author, Donald, is a true engineer at heart when making follow up comments after a few sections saying "You can do xyz, heres how to do it; though it probably wont mean much if you do". I audibly laughed a few times having been in similar situations knowing Donald most definitely had huge smirk when writing that down. A good portion of the content in the book was known to me and yet I still found I was learning and considering some of my strategies in place presently for tackling issues. I really couldn't recommend this book more to anyone- while it considers you know some intermediate concepts it provides approachable and relatable use cases which are easily replicated or modified. ... show more
Reviewed in the United States on November 26, 2023 by Malware

  • Nothing I can think of.
Format: Paperback
It arrived just fine, in good order. Exactly what I wanted. It will make a fine addition to my Linux library. Now to have it spiral bound to match my other ones for ease of use.
Reviewed in the United States on December 21, 2025 by Steve

  • Bring Linux security to the max possible.
Format: Paperback
Linux is very secure out of the box, but if you want to improve security even more, get this book.
Reviewed in the United States on November 17, 2025 by CapnBill

  • Essential read for any Linux admin
Format: Paperback
Our company makes us take the Security+ exam which is a total joke. Would be much better to just have everyone read this book. One of the two or three best Linux books out there. Well written and full of very useful information.
Reviewed in the United States on April 30, 2024 by Robert J. Nagel

  • Everything is in there but Secure Boot info
Format: Paperback
Information about Secure Boot keys and signing your bootloaders is missing from this book. Other than that it is very educational.
Reviewed in the United States on March 11, 2024 by Jeff Childers

  • Exceptional value derived within the first 10 minutes of this book's arrival
Format: Paperback
I've read a TON of networking and Linux books, and this is the first time in a long time that a book has delivered value during the first quick-contents-scan I do upon receipt. Not only did I find two "winners" that I will immediately apply to a customer's network, I understood everything I read immediately - no going back to re-read anything. This book does not suffer from the typical "disarray" that other packt publisher titles suffer from - whether due to multiple authors' disjoint writing styles, or hastily-assembled contents cutting too wide a swath of the technology it purports to cover. This book suffers from neither of those two concerns. The singular author has issued this third edition of his work, and it is coherent and singularly-voiced - with humor and obvious knowledge from which he writes. I am impressed with this book, the author and editor(s) behind it. It is definitely well worth the investment! ... show more
Reviewed in the United States on August 1, 2023 by sipy

  • Really Good
Format: Kindle
This is the kind of stuff I would like to see as a college course. Of course I'd also like it to be taught by a teacher with real life experience
Reviewed in the United States on May 27, 2023 by Kindle

  • Not long enough!
Format: Kindle
Excellent material, good coverage and understandable. Just what I needed to get up to speed and set up an rsyslog server.
Reviewed in the United States on August 25, 2024 by Darryl L. Rowe

Can't find a product?

Find it on Amazon first, then paste the link below.
Checking for best price...