Linux for Networking Professionals: Securely configure and operate Linux network services for the enterprise
€49
Price: $48.99
(as of Oct 03, 2025 21:10:24 UTC – Details)
Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skills
Key Features:
Learn how to solve critical networking problems using real-world examplesConfigure common networking services step by step in an enterprise environmentDiscover how to build infrastructure with an eye toward defense against common attacks
Book Description:
As Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must.
This book will guide you in building a strong foundation of Linux networking concepts. The book begins by covering various major distributions, how to pick the right distro, and basic Linux network configurations. You’ll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. You’ll discover a wide range of network services, why they’re important, and how to configure them in an enterprise environment. Finally, as you work with the example builds in this Linux book, you’ll learn to configure various services to defend against common attacks. As you advance to the final chapters, you’ll be well on your way towards building the underpinnings for an all-Linux datacenter.
By the end of this book, you’ll be able to not only configure common Linux network services confidently, but also use tried-and-tested methodologies for future Linux installations.
What You Will Learn:
Use Linux as a troubleshooting and diagnostics platformExplore Linux-based network servicesConfigure a Linux firewall and set it up for network servicesDeploy and configure Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services securelyConfigure Linux for load balancing, authentication, and authorization servicesUse Linux as a logging platform for network monitoringDeploy and configure Intrusion Prevention Services (IPS)Set up Honeypot solutions to detect and foil attacks
Who this book is for:
This book is for IT and Windows professionals and admins looking for guidance in managing Linux-based networks. Basic knowledge of networking is necessary to get started with this book.
Publisher : Packt Publishing
Publication date : November 11, 2021
Language : English
Print length : 528 pages
ISBN-10 : 1800202393
ISBN-13 : 978-1800202399
Item Weight : 1.98 pounds
Dimensions : 7.5 x 1.19 x 9.25 inches
Best Sellers Rank: #978,408 in Books (See Top 100 in Books) #100 in Linux Programming #140 in Linux Networking & System Administration #475 in Computer Network Security
Customer Reviews: 4.5 4.5 out of 5 stars 24 ratings var dpAcrHasRegisteredArcLinkClickAction; P.when(‘A’, ‘ready’).execute(function(A) { if (dpAcrHasRegisteredArcLinkClickAction !== true) { dpAcrHasRegisteredArcLinkClickAction = true; A.declarative( ‘acrLink-click-metrics’, ‘click’, { “allowLinkDefault”: true }, function (event) { if (window.ue) { ue.count(“acrLinkClickCount”, (ue.count(“acrLinkClickCount”) || 0) + 1); } } ); } }); P.when(‘A’, ‘cf’).execute(function(A) { A.declarative(‘acrStarsLink-click-metrics’, ‘click’, { “allowLinkDefault” : true }, function(event){ if(window.ue) { ue.count(“acrStarsLinkWithPopoverClickCount”, (ue.count(“acrStarsLinkWithPopoverClickCount”) || 0) + 1); } }); });
5 reviews for Linux for Networking Professionals: Securely configure and operate Linux network services for the enterprise
Add a review
€49
M –
Lots of information for anyone who works with Linux networking
A broad look at Linux networking with a focus on security and network services. Covers network configuration, troubleshooting, firewalls, security standards, DNS, DHCP, certificates, RADIUS, load balancers, WIreshark, network monitoring, intrusion prevention, and honeypots. It it relatively up to date (published in 2021). A good resource for learning more about what’s available in the Linux networking space.
Kenneth L. Armstrong –
Invaluable information for the modern network administrator
This bookâs writing style is clear and easy to understand. There is a clear focus on not just installing and configuring various network services but also an extensive amount of coverage is included detailing the procedures needed to secure and test these services for vulnerabilities (particularly with DNS, DHCP, and SNMP among others). A plethora of tools and techniques for monitoring and analyzing network traffic from a variety of sources is covered really well.There is ample coverage of the use of legacy networking tools and their modern equivalents. An example of this includes the usage and comparisons between the old ifconfig command set and the new ip command set. Another example is the legacy iptables commands and the newer nftables commands to manage firewalls. However, there are no examples that use firewalld, but the usage of nftables makes up for this omission.A fair bit of network theory is sprinkled throughout the book and the basics (as well as some more advanced aspects of networking) are covered well in Chapter 3 along with useful examples that utilize numerous tools that can be used to explore these topics. I especially appreciated the sections that demonstrated the use of the /proc kernel file system area to explore various network connection properties.Chapter 5 contains some very excellent examples on how to create an inventory of your network environment to be used with security audits. Although SELinux and AppArmor were both discussed, their coverage was extremely light without much in the way of useful examples. The rest of the security topics within the book definitely ease the pressure from this mild shortcoming.The book as a whole is definitely written for the network and server administrators in a secure corporate environment. There is plenty in here for a home network setup, but there are plenty of other books on those topics. The key audience here are those working in very large and global networks with regards to load balancing and dealing with various cloud services and centralized authentication systems. I recommend this book to any Linux professional, as there is just too much good information contained within these pages that systems and network professionals need to know.
Donald A. Tevault –
Great for Linux beginners
This is a very well-written book, which is ideal for anyone who’s just started out learning Linux networking. It starts out with a great overview of basic networking theory, and then goes through the basic networking commands. Then, you get an overview of the various networking services that Linux can run, and how to set them up. Everything is clearly explained, so even if you’re a Linux beginner, you won’t have any problems following the material.There is one thing though, of which the Linux beginner needs to be aware. That is, in Chapter 2, the author gives the impression that he’s performing the demos on Ubuntu Server, when in reality he’s performing them on Ubuntu Desktop. The difference is that Ubuntu Server and Ubuntu Desktop use two different types of networking services, which means that these demos won’t work if you’re using Ubuntu Server. But, if you use Ubuntu Desktop, everything in Chapter 2 will work just fine, and everything after Chapter 2 will work fine on either Server or Desktop. (I’m not taking off a star for this. It’s just something that the reader needs to know about.)Overall, a great book, which I highly recommend.
Den Jefferson –
Good coverage of complex material with plenty of hands on example code.
Sophisticated delivery of a complex topic. This edition covered modern networking as well as legacy commands and concentrates on Command Line Interface tools as it should considering the intended professional audience. I only gave this book three stars because numerous sections of the book refer to the appendix, which for some inexplicable reason is missing from my copy. Most aggravating of all is the topic of IPv6 in completely missing, because it was put in the appendix. Is it my specific copy or is everyone also missing the appendix from their printed book?
Just Some Guy –
TL;DR: This book is legit! Buy it. Read it. Thank me later.I’m a developer, looking to learn more about TIP/IP networking (to better architect cloud applications, etc.). This book offered me exactly I was looking for, and then some.It’s really aimed at network admins, rather than developers; It delves deeply into many topics that would apply to building/managing a network but not so much to shipping web apps (ex: VoIP networking, managing switches/routers, etc.). That said, these are many things that will benefit anyone that’s even casually interested in managing their home network, much less understanding how an office network functions (or building their own IP network for whatever purpose).What I really like about this book is that in each chapter the author does a nice job of introducing each topic with a theoretical foundation and real-world context, before then delving into the specifics of technical protocols/configurations/implementations, etc. Even for things I’ll never care about (like support or debugging VoIP), he grounds each topic in ways that keep it (mostly) interesting and digestible.A final point that I really appreciated is that the author shares extensive valuable insights related to network security topics and considerations, both from an attacker’s perspective (white hat penetration testing, etc.), and the opposing defensive perspective (admins, etc.). This is the entire focus of the last 3 chapters, but it’s also present to varying degrees throughout the book.Whether you’re managing a network, building apps, working in DevOps, or just trying to secure your home wifi, this book is a solid winner!** My ONLY critique would be that throughout the book the Linux examples use Ubuntu 20.04 almost exclusively. Ubuntu is a free and popular distro which anyone can easily acquire and use with VirtualBox to follow along throughout the book â but for anyone using RedHat/etc. you’ll need to do more work to apply some of the examples to your own environment(s).