Book Reviews - Browse Book Reviews Categories Book Reviews - Search Book Reviews Book Reviews - About Us Book Reviews - FAQ
 
Book Reviews Categories

Accessories Arts & Photography Audio CDs Audiocassettes Bargain Books Biographies & Memoirs Business & Investing Calendars Children's Books Computers & Internet Cooking, Food & Wine Entertainment Gay & Lesbian Health, Mind & Body History Holiday Greeting Cards Home & Garden Horror Large Print Literature & Fiction Mystery & Thrillers Non-Fiction Outdoors & Nature Parenting & Families Professional & Technical Reference Religion & Spirituality Romance Science Science Fiction & Fantasy Sheet Music & Scores Sports Teens Travel e-Books & e-Docs

Link Partners:
Literature Forums Define Words Electronic Dictionary Writers Wanted Writing Forums Writing Articles Writing Resources Cheat Literature Vault XBox Cheats Cheats Literary Escape Cheat Codes PS3 Demon Gaming PS3 Cheats XG Cheats



















































































































































 

Book Reviews

Securing Linux: A Survival Guide for Linux Security
Book: Securing Linux: A Survival Guide for Linux Security
Written by: David Koconis Jim Murray Jos Purvis Darrin Wassom
Publisher: SANS Institute
Average Customer Rating: 5.0 / 5

Linux Makes the World Load Faster
Rating: 4 / 5
Wow! What a book. Although I know very little about Linux as an OS, even less about security and can barely dress myself, I successfully used this book to set-up a secure, linux-based environment for my top-notch anime collection... All in all, I highly recommend this product...


Refreshing and Informative
Rating: 5 / 5
Why does every book on Linux try to tackle too many issues? Let's face it, 700-800 or even a 1000 pages is just TOO much information. If you are looking for a complete and concise guide to securing your Red Hat Linux installation then I HIGHLY recommend picking up this book.

I would rank this as a book that is perfect for intermediate Unix admins but a colleague of mine without ANY Linux experience said she found this book to be a valuable resource in her steep learning curve. The book provides many examples of different configurations and provides great pointers to other resources if you want more information about a particular topic.

All in all, I was VERY impressed with this book and I would consider it a "must have" for anyone interested in securing their Red Hat Linux installations.




Great technical manual!!
Rating: 5 / 5
The excellent SANS "Securing Linux Step by Step"guide suffers from a
major problem: you can't cut-and-paste the commands from it into your
Linux system! The desire to do so constantly appear while reading the
manual, and I was very eager to try some of the things described
thereof.

The guide presents ultimate hands-on, indeed as step-by-step as they
do. A little of text and a lot of commands to accomplish it! All
configuration "recipes" are supposed to be tested by many of the guide
contributors and reviewers. I have found no inaccuracies of any kind.

Its a pity that there is no way to cut and paste from the book and
click on links too. The guide begs to have a CD, floppy or a companion
site since commands need to be typed on the server.

The book starts from a nice security policy primer and a summary of
security principles, which even touch upon physical security, backups
and other useful operational issues.

The range of advice is wide and covers everything from very basic
passwords security to complicated methods of chrooting various network
daemons for extra security. The complete step-by-step instructions for
chrooting bind and ssh are provided together with several sample
configuration files. Tips on securing many Linux applications such as
Apache, Sendmail, Bind, Samba are also detailed in separate
chapters. Securing Wu-FTPD, however pointless it might be in light of
a flood of attacks, is also described. Its a pity that common
replacements such as qmail, proftpd and djbdns are not covered.

While other books offer more breadth (such as coverage of many
different tools etc), this is ideal for those seeking depth. This
guide would likely not win any literature prizes, but can save a life
of a Linux admin.

Moreover, even if you think you know _everything_ about Linux security
- read it anyway, since you find some new stuff, just like I did. On
the other hand, complete novices will also benefit from it greatly,
since even just typing the command blindly and then reading up on them
and gaining in-depth understanding is no the worst way to jump start
your Linux security expertise. Overall, if you own or administer a
Linux system - get the guide.

Anton Chuvakin, Ph.D., GCIA, GCIH is a Senior Security Analyst with a
major information security company. His areas of infosec expertise
include intrusion detection, UNIX security, forensics, honeypots,
etc. In his spare time he maintains his security portal
info-secure.org




 
 
 



Against All Enemies
by Richard A. Clarke

The Da Vinci Code
by Dan Brown

Worse Than Watergate
by John W. Dean

Eats, Shoots & Leaves
by Lynne Truss & Lynne Russ

The South Beach Diet Cookbook
by Arthur Agatston

The South Beach Diet
by Arthur Agatston

The Spiral Staircase
by Karen Armstrong

Angels & Demons
by Dan Brown

The Maker's Diet
by Jordan Rubin

South Beach Diet Good Fats/Good Carbs Guide
by Arthur Agatston

South Beach Diet Book by Arthur Agatston
Da Vinci Code by Dan Brown

The Purpose Driven Life by Lemony Snicket

© Copyright 2024 Book Reviews. All rights reserved.