The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

Book details of 'Linux System Security: The Administrator's Guide to Open Source Security Tools'

Cover of Linux System Security: The Administrator's Guide to Open Source Security Tools
TitleLinux System Security: The Administrator's Guide to Open Source Security Tools
Author(s)Scott Mann, Ellen L. Mitchell
ISBN0130158070
LanguageEnglish
PublishedDecember 1999
PublisherPrentice Hall PTR
Web links for this book
Search at Bookcrossing.com
Wikipedia booksources
Shop for this book
At Amazon.com
At Amazon.co.uk

Back to shelf Computer
Amazon.com info for Linux System Security: The Administrator's Guide to Open Source Security Tools

Score:

virtualbookcase.com score: 3.0 ***--  Vote for this book

The Virtual Bookcase Reviews of 'Linux System Security: The Administrator's Guide to Open Source Security Tools':

Reviewer amazon.com wrote:
The introduction of Linux System Security acknowledges that there's no magic bullet as far as security is concerned. Security-minded system administration is a process of constant revision. It promises, though, that "[i]f you follow the procedures outlined in this book, you will certainly reduce your level of vulnerability." The book delivers on that promise in spades. Using Red Hat Linux as the demonstration environment, the authors explain how to use a suite of publicly available tools to analyze, protect, and monitor your machines and networks. They approach the subject from a practical standpoint, emphasizing software and its use while referring the reader (using copious bibliographic notes) to more specialized works for detailed information on cryptography, firewall configuration, and other subjects. Scott Mann and Ellen Mitchell have done excellent work in combining explanations of the "soft" aspects of security management with the particulars of using software. In a typical section, they explain how to acquire, install, and run Crack, a password breaker. First they show how a bad guy would use Crack to get unauthorized access to a machine over a network; then they explore the "white hat" applications of the program as a security tool for preemptively weeding out weak passwords. More detailed coverage goes to tiger and Tripwire, a pair of powerful auditing and monitoring tools. Along with Maximum Linux Security (which covers more offensive and defensive weapons in less detail), this is one of the two best Linux security books you can own.
Add my review for Linux System Security: The Administrator's Guide to Open Source Security Tools
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2017 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement