Velocity Reviews - Computer Hardware Reviews

Velocity Reviews > Newsgroups > Computing > Computer Security > REVIEW: "Linux Security Cookbook", Daniel J. Barrett/Richard E. Silverman/Robert G. Byrnes

Thread Tools

REVIEW: "Linux Security Cookbook", Daniel J. Barrett/Richard E. Silverman/Robert G. Byrnes

Rob Slade, doting grandpa of Ryan and Trevor
Posts: n/a
Apologies for the duplicate sent out yesterday.

(Also, for the question/comment last Thursday about whether I liked *any*
books, yes, occasionally I do


"Linux Security Cookbook", Daniel J. Barrett/Richard E.
Silverman/Robert G. Byrnes, 2003, 0-596-00391-9, U$39.95/C$61.95
%A Daniel J. Barrett Removed)
%A Richard E. Silverman (E-Mail Removed)
%A Robert G. Byrnes (E-Mail Removed)
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
%D 2003
%G 0-596-00391-9
%I O'Reilly & Associates, Inc.
%O U$39.95/C$61.95 707-829-0515 fax: 707-829-0104 (E-Mail Removed)
%P 311 p.
%T "Linux Security Cookbook"

In the introduction, the authors state that this is not a security
text, but a list of practical and individual pointers for improving
security in specific areas.

Chapter one covers how to take system snapshots with Tripwire, in
order to detect changes that might indicate an intrusion or a virus.
The establishment of a firewall, using the iptables and ipchains
utilities, is dealt with in chapter two. Chapter three examines the
control of access to various network services. Authentication
techniques and infrastructures are detailed in chapters four and five.
Protecting outgoing network connections, files, and email are
described in chapters six, seven, and eight respectively. The
material on testing and monitoring, in chapter nine, is the most
extensive in the book, and provides a good introduction to Snort as

This is good, practical advice, and makes an excellent reference for
anyone dealing with the security of Linux in a networked environment.
In one sense the authors are right, for they stick to the nuts and
bolts, without discussing security frameworks or theories. In another
sense they are wrong: this text does what the "hacking" books only
pretend to do. The authors of the genre of "Teach Total Idiots How to
Hack and They Will Automatically Turn Into Security Experts" texts all
imagine that they teach you how to harden/secure a system, but don't.
This does.

copyright Robert M. Slade, 2003 BKLNSCCB.RVW 20031019

(E-Mail Removed) (E-Mail Removed) (E-Mail Removed)
"If you do buy a computer, don't turn it on." - Richards' 2nd Law
============= for back issues:
[Base URL] site
or mirror
CISSP refs: [Base URL]mnbksccd.htm
Security Dict.: [Base URL]secgloss.htm
Security Educ.: [Base URL]comseced.htm
Book reviews: [Base URL]mnbk.htm
[Base URL]review.htm
Security Educ.:
Review mailing list: send mail to (E-Mail Removed)

Reply With Quote

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
Daniel Boone 3rd & 4th Seasons Next? teem DVD Video 0 04-06-2007 04:10 AM
Daniel Boone teem DVD Video 0 03-17-2007 11:57 PM
Daniel Boone teem DVD Video 2 01-11-2007 02:26 AM
REVIEW: "The Secured Enterprise", Paul E. Proctor/F. Christian Byrnes Rob Slade, doting grandpa of Ryan and Trevor Computer Security 0 09-01-2004 03:32 PM
(Dutch) Review: Tunnel (Daniel Baldwin) DVD Specials DVD Video 0 11-11-2003 11:39 PM