REVIEW: "Linux Security Cookbook", Daniel J. Barrett/Richard E. Silverman/Robert G. Byrnes
Apologies for the duplicate sent out yesterday.
(Also, for the question/comment last Thursday about whether I liked *any*
books, yes, occasionally I do :-)
"Linux Security Cookbook", Daniel J. Barrett/Richard E.
Silverman/Robert G. Byrnes, 2003, 0-596-00391-9, U$39.95/C$61.95
%A Daniel J. Barrett email@example.com
%A Richard E. Silverman firstname.lastname@example.org
%A Robert G. Byrnes email@example.com
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
%I O'Reilly & Associates, Inc.
%O U$39.95/C$61.95 707-829-0515 fax: 707-829-0104 firstname.lastname@example.org
%P 311 p.
%T "Linux Security Cookbook"
In the introduction, the authors state that this is not a security
text, but a list of practical and individual pointers for improving
security in specific areas.
Chapter one covers how to take system snapshots with Tripwire, in
order to detect changes that might indicate an intrusion or a virus.
The establishment of a firewall, using the iptables and ipchains
utilities, is dealt with in chapter two. Chapter three examines the
control of access to various network services. Authentication
techniques and infrastructures are detailed in chapters four and five.
Protecting outgoing network connections, files, and email are
described in chapters six, seven, and eight respectively. The
material on testing and monitoring, in chapter nine, is the most
extensive in the book, and provides a good introduction to Snort as
This is good, practical advice, and makes an excellent reference for
anyone dealing with the security of Linux in a networked environment.
In one sense the authors are right, for they stick to the nuts and
bolts, without discussing security frameworks or theories. In another
sense they are wrong: this text does what the "hacking" books only
pretend to do. The authors of the genre of "Teach Total Idiots How to
Hack and They Will Automatically Turn Into Security Experts" texts all
imagine that they teach you how to harden/secure a system, but don't.
copyright Robert M. Slade, 2003 BKLNSCCB.RVW 20031019
email@example.com firstname.lastname@example.org email@example.com
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
============= for back issues:
[Base URL] site http://victoria.tc.ca/techrev/
or mirror http://sun.soci.niu.edu/~rslade/
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Security Educ.: [Base URL]comseced.htm
Book reviews: [Base URL]mnbk.htm
Security Educ.: http://groups.yahoo.com/group/comseced/
Review mailing list: send mail to firstname.lastname@example.org
|All times are GMT. The time now is 04:36 PM.|
Powered by vBulletin®. Copyright ©2000 - 2014, vBulletin Solutions, Inc.
SEO by vBSEO ©2010, Crawlability, Inc.