Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Real World Linux Security (2nd Edition)

Real World Linux Security (2nd Edition)

List Price: $59.99
Your Price: $41.99
Product Info Reviews

<< 1 2 3 4 5 >>

Rating: 5 stars
Summary: This book is fantasitc!
Review: Out of all the books on various Linux topics that I own, and I own several, this one is the best. It covers security issues very well, it's full of real-world examples and it's fun to read. I would reccommend this book to anyone who is interested in securing their Linux box. And to those who aren't concerned about security, I would HIGHLY reccommend this book.

Rating: 5 stars
Summary: The best on the subject; practical and thorough
Review: Real World Linux Security (2nd ed.) far exceeded my already-high
expectations, having known the author and his expertise for a
long time. Computer security is one of my secondary fields of
expertise, as is Linux, yet I learned a lot from this book that
I had previously overlooked -- and it helped me repair a system
that crackers had attacked.

Bob writes in a very readable way that manages to be simultaneously
entertaining and informative, a very rare combination.

He clearly realizes that a lot of readers will be in a hurry,
looking for advice when there's already trouble brewing, so
he starts with a very terse overview, going immediately to
chapter 2 "Quick Fixes for Common Problems. Chapters 4 and 5
cover the most commonly attacked subsystems and how they're
attacked.

That's already book-length; over 250 pages. It goes on
to Advanced Security Issues, Security Policies, Case Studies
(wherein I'm mentioned :-) scanning and monitoring your
system, regaining control, repairing damage, and much much
more than I can mention in the max 1000 words here.

Extremely extensive, and both the table of contents and index
are well done, something important to me for quick reference.

Rating: 4 stars
Summary: An excellent security reference
Review: Real World Linux Security, Second Edition, is an excellent security reference. This book has a very broad scope of security, covering more than just hacks and quick fixes. For example it has a section that discusses creating security policies and procedures. These topics sometimes feel like they are not quite on the topic of Linux security, since they fall into more general computer security category. I am of two minds about this. It is nice to have these ideas brought up here because you do not need to purchase a separate book to get some ideas. However you cannot get the same level of detail when you want to cover too many aspects of security in one book.

Overall, I found this to be a very good reference. There are certainly other books I'd recommend as supplimental material, but
in general this book holds it's own.

Rating: 5 stars
Summary: Beginners Dream
Review: They say that hindsight is 20/20, and this couldn't be any closer to the truth after reading "Real World Linux Security" by Bob Toxen. Even after the first few chapters, Bob provides the reader with a wealth of information about basic and critical steps needed to secure Linux systems. The best aspect of this book is its cross-distrobution compatibility. Bob provides you with plenty of information on system hardening tactics that you can, easily too, harden any Linux distrobution, whether it be Redhat, Slackware, Debian, or a lesser known distro. All in all this is a wonderful book for all levels of Linux users and SysAdmins, from newbies to very experinced users. Being new to System Administration, this book was worth every penny.

Rating: 5 stars
Summary: Belongs on your bookshelf
Review: This book has been updated well. Not just some cut and paste from a previous edition. The first edition was excellent. This edition is even better. The writing is some the best I've ever read in a technical book. Secrets & Lies is the concept book and this is the application of those concepts. This should between your Bruce Schneier books and your O'reilly Systems books.

If you are a Security Professional, Systems Administrator or a wannabe this book belongs on your bookshelf. The topics are broad and yet fairly in depth. Even if you think you know security get this book. The information is organized that well.

You can use this book to harden just about *nix flavor machine based on his examples. The attack processes illustrated will reinforce your existing knowledge or teach how you need to start thinking about security.

Bottom line is security has many layers or rings. If one ring fails hopefully you have several other rings of protection. Don't rely on a firewall to protect you. Firewalls only scratch the surface in building a secure enviroment.

Rating: 3 stars
Summary: Good information, poor organization
Review: This book has quite a lot of usefeul info in it, but the organization is terrible. Also, the security points frequently seem like duplicates of previous ones. And the writing style could use a little more editing; the author comes off as a bit too much of a hotshot. Nonetheless, a useful edition to the security-conscious Linux-users bookshelf.

Rating: 5 stars
Summary: One of those "gotta have" reference books
Review: This book is a "must have" for the novice and expert alike. While no system is 100% secure against crackers, the advice contained herein will definitely even the odds. It was fairly easy to read, with less "technese" than is usual for reference manuals of its ilk. Plenty of useful scripts and examples. No Sys Admin should overlook this particular tome!

Rating: 5 stars
Summary: Deep detailed analysis
Review: This book is a deep detailed analysis of
communications security in the context of
public digital packet switched networks.
This book is full of difficult English
which while grammatically and syntactically
correct, may take several rereadings to
understand, or even phrase correctly. It
is as if the author learned his English
at one of those elitist preparatory
schools and though he is obviously trying,
can't quite write for us common nerds.
But then again, it is refreshing to use

all of the techniques one learns in English
class to parse and decode highly literate
prose.

Rating: 5 stars
Summary: Must have for a Linux user
Review: This book is a must have for anyone using or responsible for Linux boxes connected to the Internet. This book is a great book on Host security. very detailed and step by step. Mr Toxen was not afraid to go into detail. He explained quick fixes to rapidly secure your machine, as well as more detailed examples. I loved this book and even used the ideas to harden my Solaris servers at work.

Rating: 5 stars
Summary: Follow it like a religion
Review: This book is an excellent guide for anyone who needs to protect his/her system (LAN/MAN/WAN/Databases/CGI/the list never ends) from intrusion. All details are clearly outlined and even graded in threat using skulls (a good alternative to stars). It is mosly assereted by the author that it is UNIX admins that benefit from it but believe me with 24/7 internet all are confronting that point when someone will eventually break in. Protecting is logic and breaking in too is logic. Just the question is "IS YOUR LOGIC BETTER".


<< 1 2 3 4 5 >>

© 2004, ReviewFocus or its affiliates