"Hardening" is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks.
This guide is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate attacks and compromises, and to "harden" Windows NT, 2000, XP, and Server 2003 against them.
The purpose of this book is to guide technical and administrative staff working in healthcare through the process of building secure, regulatory-compliant systems and processes that will assure patient confidentiality while avoiding costly penalties.
This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations and guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that can be used to customize the servers boot process to fit the datacenters requirements.
With all of the threats to their security, many corporations have learned the hard way that threats can come from both the outside and from within. This is a book promoting the concept of least privilege. It will give readers information on protecting virtual environments, policy, compliance and more to keep good people from doing bad things.
Pro PHP Security will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. You'll learn about various security measures that will help you prevent attackers from potentially disrupting site operation or destroying data.
Securing SQL Server is one of the most important responsibilities of the SQL Server professional, and this carefully researched book offers solid advice on implementing good practices that will ward off future viruses before they are even created.
An easily accessible but detailed book making it easy for beginners to experienced engineers to get the low down on the latest policies, practices, tools, and technologies available in the filed of information security.
TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their usage in real applications that the reader can build themselves. It includes access to a live execution environment and real code examples.