Skip to content
Paperback Hack Proofing Linux: A Guide to Open Source Security Book

ISBN: 1928994342

ISBN13: 9781928994343

Hack Proofing Linux: A Guide to Open Source Security

From the authors of the bestselling E-Mail Virus Protection Handbook ! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating... This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Good*

*Best Available: (ex-library)

$5.89
Save $46.06!
List Price $51.95
Almost Gone, Only 1 Left!

Customer Reviews

4 ratings

Worth the reading.

Follow simple step by step procedures to hardening your linux system, i was able to read the meat of this book in a 4 hour airplane flight. Easily install and configure Linux, firewalls, etc.

2 months into Linux and found the perfect book

This book starts off by defining the Open Source Movement and the General Public License. It then moves on to everything else...As a newbie (2 months of using the free download of Mandrake 8.1 after doing the free online course...and 5 months of basic networking skills), I found this book an excellent read. It covered almost everything I needed to know to secure my network at home (I don't use windows anymore), and gave me confidence enough to want to apply for Network Administration somewhere.CD included, you get tricks for locking down your system, or your whole network even, and the apps to help you do it (the entire book is in HTML on the CD, too!) I recommend this book to anyone wanting to learn linux, or anyone wanting to learn linux security.I took half a star because it mainly refers to Red Hat Linux over others, and another half because I could see how a college professor might want a much more technical manual over this textbook style guide. Great book!

Hack Proofing Linux: A great guide to Open Source Security

Hack Proofing Linux does the following very accurately:1. It shows you how to deploy IPsec using FreeSWAN.2. Readers learn detailed information about how to configure packet filters and proxy servers.3. Although many theoretical references exist, few resources have practical advice concerning how to implement Kerberos. Before publication of this book, no authors had the common sense to show all of the steps necessary for a practical implementation. Other references either omitted steps or simply remained on a general level. I've never seen a book that does such as good job on this, in such a handy way.4. After reading this book, you will have more than enough accurate information to scan systems for vulnerabilities, and you will also be able to accurately map and manage networks. For those who need more explanation, all they have to do is implement the tools as described, and they can then actually learn by doing. Seeing as how most of these people can't even buy or read the book all the way through, no matter they are impatient with a practical approach.5. The book focuses on the pliability of Linux. Do you want to use a Linux server as a firewall? Read this book. Do you want to use it to audit systems? Read this book. Do you want to use Linux to securely centralize authentication? Read this book. Even though this book doesn't appear to be popular to people in Texas who don't understand that a mount point can be any directory on a Linux system, or who don't realize that Xinetd is a defacto standard, this California professor thinks it does an excellent job.

Linux newbie, reading as fast as I can...

I'm learning Linux in support of setting up version 3.0 of our homegrown firewall. I've been reading as fast as I possibly can and have a general idea of what I need to do to harden our firewall (yes I have a backup guy to go to!). In relatively simple tables throughout the book he lists what isn't necessary, what should be uninstalled, disabled or other. He also pretty much gives you step by step instructions. Since I'm a linux newbie, I need another book to help me figure out how to do some of things he lists (like disable service/daemons) - but that doesn't detract from this book.What I really like about this book is that is a One Stop Shop. It gathers information that you might find from various other sources - online, howto's, man pages, security alerts. I know that since I've read enough of those others to know these 'what you should do's are out there. They're just everywhere. That's why I like this book. If I were not such a newbie I might be able to give it a higher rating, but I don't know enough yet to know if it omits anything really important or is just plain wrong.It covers: ports, daemons, bastille, tripwire, ipchains/iptables, nmap, what to set when recompiling the kernel, analyzing network traffic, VPNs, testing your firewall, apache config, squid config, and other topics.The printed layout is great: Chapter contents, big bold headings, tables, easy to read commands, numbered steps, very easy to read tables, screenshots, summary, fast track, FAQs.The only shortcoming is that he doesn't list specific tips on partitions which I found in another ref.All in all a very useful book.
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured