Amazon Price: N/A (as of August 20, 2019 04:50 –
Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. This worked fine in UNIX’s youth, but today, system administration responsibilities are spread among many people and applications. Each person needs a tiny slice of root’s power.
Sudo lets you divide root’s monolithic power between the people who need it, with accountability and auditability.
Continue reading “Sudo Mastery: User Access Control for Real People (IT Mastery Book 3)”
Amazon Price: N/A (as of February 7, 2018 11:03 –
"Michael W. Lucas is one of my favorite technical authors, and every book he writes is a must-read for IT professionals." – Richard Bejtlich, CSO, MANDIANT, and TaoSecurity blogger
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.
Continue reading “SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery Book 1)”
Amazon Price: N/A (as of October 15, 2019 17:47 –
DNS is one of the oldest protocols on the Internet, and was designed for a network without hostile users. Anyone who wants to break into a network starts by investigating the target's Domain Name Service. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century. But learning DNSSEC requires wading through years of obsolete tutorials, dead ends, and inscrutable standards.
Continue reading “DNSSEC Mastery: Securing the Domain Name System with BIND (IT Mastery Book 2)”