Secure the Shell A Practical Guide to Linux Administration with Security in Mind Secure Stack Series – Book 1 Build Linux systems that don’t just run — they defend. Whether you're a new sysadmin, security-conscious developer, or federal contractor working with classified environments, Secure the Shell bridges the gap between basic Linux administration and real-world cybersecurity. This isn't just another how-to guide for installing packages. It’s a tactical manual for building Linux systems that are hardened, compliant, and mission-ready from day one. Drawing on years of experience in federal cybersecurity, author L. Denise Young breaks down the operational mindset and command-line tactics needed to run secure Linux environments in the most demanding sectors. What You'll Learn Inside: How to configure secure SSH access, audit logging, and firewall rules - STIG alignment and DISA compliance principles made practical - Role-based access control and privilege separation - Securing services like Apache, NGINX, and PostgreSQL - Multi-user environment tips with security-first thinking - Real-world scenarios from government and DoD workspaces - How to avoid rebuilds by getting security right the first time Who This Book Is For: Aspiring and current Linux system administrators - Information System Security Officers (ISSOs) - Cybersecurity professionals supporting Linux environments - Students in cybersecurity or DevSecOps training - Anyone tasked with building or maintaining secure systems If you’re tired of vague theory and want actionable steps from someone who’s secured Linux in places that can’t afford failure — this is your guide. Grab your copy of Secure the Shell today and build your stack the secure way.