Rating:  Summary: This book is fantasitc! Review: Out of all the books on various Linux topics that I own, and I own several, this one is the best. It covers security issues very well, it's full of real-world examples and it's fun to read. I would reccommend this book to anyone who is interested in securing their Linux box. And to those who aren't concerned about security, I would HIGHLY reccommend this book.
Rating:  Summary: The best on the subject; practical and thorough Review: Real World Linux Security (2nd ed.) far exceeded my already-high expectations, having known the author and his expertise for a long time. Computer security is one of my secondary fields of expertise, as is Linux, yet I learned a lot from this book that I had previously overlooked -- and it helped me repair a system that crackers had attacked.Bob writes in a very readable way that manages to be simultaneously entertaining and informative, a very rare combination. He clearly realizes that a lot of readers will be in a hurry, looking for advice when there's already trouble brewing, so he starts with a very terse overview, going immediately to chapter 2 "Quick Fixes for Common Problems. Chapters 4 and 5 cover the most commonly attacked subsystems and how they're attacked. That's already book-length; over 250 pages. It goes on to Advanced Security Issues, Security Policies, Case Studies (wherein I'm mentioned :-) scanning and monitoring your system, regaining control, repairing damage, and much much more than I can mention in the max 1000 words here. Extremely extensive, and both the table of contents and index are well done, something important to me for quick reference.
Rating:  Summary: An excellent security reference Review: Real World Linux Security, Second Edition, is an excellent security reference. This book has a very broad scope of security, covering more than just hacks and quick fixes. For example it has a section that discusses creating security policies and procedures. These topics sometimes feel like they are not quite on the topic of Linux security, since they fall into more general computer security category. I am of two minds about this. It is nice to have these ideas brought up here because you do not need to purchase a separate book to get some ideas. However you cannot get the same level of detail when you want to cover too many aspects of security in one book. Overall, I found this to be a very good reference. There are certainly other books I'd recommend as supplimental material, but in general this book holds it's own.
Rating:  Summary: Beginners Dream Review: They say that hindsight is 20/20, and this couldn't be any closer to the truth after reading "Real World Linux Security" by Bob Toxen. Even after the first few chapters, Bob provides the reader with a wealth of information about basic and critical steps needed to secure Linux systems. The best aspect of this book is its cross-distrobution compatibility. Bob provides you with plenty of information on system hardening tactics that you can, easily too, harden any Linux distrobution, whether it be Redhat, Slackware, Debian, or a lesser known distro. All in all this is a wonderful book for all levels of Linux users and SysAdmins, from newbies to very experinced users. Being new to System Administration, this book was worth every penny.
Rating:  Summary: Belongs on your bookshelf Review: This book has been updated well. Not just some cut and paste from a previous edition. The first edition was excellent. This edition is even better. The writing is some the best I've ever read in a technical book. Secrets & Lies is the concept book and this is the application of those concepts. This should between your Bruce Schneier books and your O'reilly Systems books. If you are a Security Professional, Systems Administrator or a wannabe this book belongs on your bookshelf. The topics are broad and yet fairly in depth. Even if you think you know security get this book. The information is organized that well. You can use this book to harden just about *nix flavor machine based on his examples. The attack processes illustrated will reinforce your existing knowledge or teach how you need to start thinking about security. Bottom line is security has many layers or rings. If one ring fails hopefully you have several other rings of protection. Don't rely on a firewall to protect you. Firewalls only scratch the surface in building a secure enviroment.
Rating:  Summary: Good information, poor organization Review: This book has quite a lot of usefeul info in it, but the organization is terrible. Also, the security points frequently seem like duplicates of previous ones. And the writing style could use a little more editing; the author comes off as a bit too much of a hotshot. Nonetheless, a useful edition to the security-conscious Linux-users bookshelf.
Rating:  Summary: One of those "gotta have" reference books Review: This book is a "must have" for the novice and expert alike. While no system is 100% secure against crackers, the advice contained herein will definitely even the odds. It was fairly easy to read, with less "technese" than is usual for reference manuals of its ilk. Plenty of useful scripts and examples. No Sys Admin should overlook this particular tome!
Rating:  Summary: Deep detailed analysis Review: This book is a deep detailed analysis of communications security in the context of public digital packet switched networks. This book is full of difficult English which while grammatically and syntactically correct, may take several rereadings to understand, or even phrase correctly. It is as if the author learned his English at one of those elitist preparatory schools and though he is obviously trying, can't quite write for us common nerds. But then again, it is refreshing to use all of the techniques one learns in English class to parse and decode highly literate prose.
Rating:  Summary: Must have for a Linux user Review: This book is a must have for anyone using or responsible for Linux boxes connected to the Internet. This book is a great book on Host security. very detailed and step by step. Mr Toxen was not afraid to go into detail. He explained quick fixes to rapidly secure your machine, as well as more detailed examples. I loved this book and even used the ideas to harden my Solaris servers at work.
Rating:  Summary: Follow it like a religion Review: This book is an excellent guide for anyone who needs to protect his/her system (LAN/MAN/WAN/Databases/CGI/the list never ends) from intrusion. All details are clearly outlined and even graded in threat using skulls (a good alternative to stars). It is mosly assereted by the author that it is UNIX admins that benefit from it but believe me with 24/7 internet all are confronting that point when someone will eventually break in. Protecting is logic and breaking in too is logic. Just the question is "IS YOUR LOGIC BETTER".
|