HomeGroupsTalkZeitgeist
This site uses cookies to deliver our services, improve performance, for analytics, and (if not signed in) for advertising. By using LibraryThing you acknowledge that you have read and understand our Terms of Service and Privacy Policy. Your use of the site and services is subject to these policies and terms.
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Linux System Security: The…
Loading...

Linux System Security: The Administrator's Guide to Open Source… (edition 2002)

by Scott Mann, Ellen L. Mitchell, Mitchell Krell, Mitch Krell

MembersReviewsPopularityAverage ratingConversations
431378,625 (3)None
Member:sptz45
Title:Linux System Security: The Administrator's Guide to Open Source Security Tools, Second Edition
Authors:Scott Mann
Other authors:Ellen L. Mitchell, Mitchell Krell, Mitch Krell
Info:Pearson Education (2002), Edition: 2, Hardcover, 896 pages
Collections:Your library
Rating:
Tags:None

Work details

Linux System Security: The Administrator's Guide to Open Source Security Tools, Second Edition by Scott Mann

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

Linux System Security: The Administrator's Guide to Open Source Security Tools, Second Edition
by Scott Mann has advice on starting from scratch when you are setting up a machine to make it secure from attack from the outside.

It looks at everything from the filesystem upwards, and will give you a good starting point for looking at this. ( )
  maketest | Aug 26, 2009 |
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
First words
Quotations
Last words
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language
Canonical DDC/MDS

References to this work on external resources.

Wikipedia in English (2)

Book description
Haiku summary

Amazon.com Amazon.com Review (ISBN 0130470112, Hardcover)

The introduction of Linux System Security acknowledges that there's no magic bullet as far as security is concerned. Security-minded system administration is a process of constant revision. It promises, though, that "[i]f you follow the procedures outlined in this book, you will certainly reduce your level of vulnerability." The book delivers on that promise in spades.

Using Red Hat Linux as the demonstration environment, the authors explain how to use a suite of publicly available tools to analyze, protect, and monitor your machines and networks. They approach the subject from a practical standpoint, emphasizing software and its use while referring the reader (using copious bibliographic notes) to more specialized works for detailed information on cryptography, firewall configuration, and other subjects.

Scott Mann and Ellen Mitchell have done excellent work in combining explanations of the "soft" aspects of security management with the particulars of using software. In a typical section, they explain how to acquire, install, and run Crack, a password breaker. First they show how a bad guy would use Crack to get unauthorized access to a machine over a network; then they explore the "white hat" applications of the program as a security tool for preemptively weeding out weak passwords. More detailed coverage goes to tiger and Tripwire, a pair of powerful auditing and monitoring tools. Along with Maximum Linux Security (which covers more offensive and defensive weapons in less detail), this is one of the two best Linux security books you can own. --David Wall

Topics covered: Linux security practices and tools, as demonstrated under Red Hat Linux 5.2 and 6. Software and commands include Pluggable Authentication Modules (PAM), OPIE, syslog, sudo, xinetd, Secure Shell (SSH), Crack, tiger, Tripwire, The Cryptographic File System (TCFS), and ipchains. The authors discuss administrative policies and procedures along the way.

(retrieved from Amazon Thu, 12 Mar 2015 18:15:30 -0400)

(see all 2 descriptions)

No library descriptions found.

Quick Links

Popular covers

Rating

Average: (3)
0.5
1
1.5 1
2
2.5
3 1
3.5 1
4 1
4.5
5

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 128,839,169 books! | Top bar: Always visible