Rating:  Summary: Still doesn't work for me. Review: I was dissapointed in the first edition of this book because it was little more than a big list of things. This edition is not much better. It gives more information about the tools, which was sorely missing in the first version, bit still it requires too much work on our part to see what tool fits the job.As a definitive list of all the security tools you could use for Linux, this is a good book, however you better expect to investigate each on your own. If you're looking for a book that is more geared to teaching you as well as overviewing products, I suggest Hacking Linux Exposed or Real World Linux Security. The former is probably the better of the two, but both are better than this one. I'm happy to see that the author has de-anonymized himself somewhat, though.
Rating:  Summary: Understandable and Effective Advice Review: If you use Linux but do system administration only because you have to keep your system chugging along--this book is for you. It will help you understand the security impacts of your system administration decisions. The book is tome-like with 870 pages but is a fairly easy read for someone with even a bit of UNIX/Linux knowledge. You will learn alot about security and be entertained by the authors descriptions of how actual attacks on your system are performed in the real world.
Rating:  Summary: Excellent Survey of Security for Linux System Administration Review: If you use Linux but do system administration only because you have to keep your system chugging along--this book is for you. It will help you understand the security impacts of your system administration decisions. The book is tome-like with 870 pages but is a fairly easy read for someone with even a bit of UNIX/Linux knowledge. You will learn alot about security and be entertained by the authors descriptions of how actual attacks on your system are performed in the real world.
Rating:  Summary: Great Read and Informative Review: This book really opens your eyes to the world of hacking (how to stop it). I presume the auther is a hacker and his insight and detail make this book a must for sysadmin. I recommend the book to basically anyone running Linux (or Unix) even beginners, because of it's great explanations.
|