- Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)
Linux Security Cookbook Paperback – Jun 12 2003
|New from||Used from|
Special Offers and Product Promotions
Customers Who Bought This Item Also Bought
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
"I really enjoyed this book. I think my machine is more secure than before I read this book. The advice is good and pitched at, for me, the right level. References were up-to-date ad far as I could see. I would certainly recommend this book to anyone wanting to secure, or test the esisting security, of a Linux system." - Mick Farmer, Linux Security Cookbook - news@UK, September 2003
About the Author
Dan Barrett has been immersed in Internet technology since 1985. Currently working as a software engineer, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist. He has written several O'Reilly books, as well as monthly columns for Compute! and Keyboard Magazine. Dan and his family reside in Boston.
Richard E. Silverman has a B.A. in computer science and an M.A. in pure mathematics. Richard has worked in the fields of networking, formal methods in software development, public-key infrastructure, routing security, and Unix systems administration. He is the co-author of SSH, The Secure Shell: The Definitive Guide.
Inside This Book(Learn More)
Top Customer Reviews
Chapter 1 - System Snapshots with Tripwire
I liked the discussion of Tripwire and its configuration options. The sections on "Ultra-Paranoid Integrity Checking" were great! A decent introduction to Tripwire and some of its features.
Chapter 2 - Firewalls with iptables and ipchains
The difference between "Drop versus Reject" targets was good. So many books have info on iptables, but none discusses these issues. Also the point made about dropping ICMP messages was good. Quick to learn and implement recipes presented in this chapter.
Chapter 3 - Restricting Access by Remote Users
Recipe 3.7 was very neat. Allowing users to access a service only by port-forwarding over ssh allows the administrator to restrict access by user names. A smart way of imposing restrictions!
Also, in recipe 3.9, I liked the authors' approach to finding if xinetd is compiled with libwrap support.
All recipes regarding tweaking xinetd were good. It isn't always possible to look at all the configurable options with xinetd, and the authors did a good job in mentioning a few useful options.
Chapter 4 - Authentication Techniques and Infrastructures
Quick tips with PAM, openssl and kerberos. I couldnt get some of the recipes to work on my machine, but got most openssl stuff to work.
Chapter 5 - Authorization Controls
I liked this chapter the best. The discussion on sudo was enlightening, and I was able to effectively tweak most recipes to my needs.Read more ›
As a "desktop" Linux user who only administers a desktop machine and notebook the chapters I found most useful were those on intrusion detection systems (Chapter 1) and GPG (Chapters 7 & 8). That said, LSC contains dozens of useful recipes for administrators from PAM authentication to monitoring who is doing what on your system. Some of the programs covered are programs I've never heard of before, John the Ripper for example. Other recipes cover those programs I know I should check out, like Snort, but have never taken the time to.
LSC is for the most part very easy to follow. The authors have been very careful to mention when software (snort for example) might or might not be included and how to find and install it. I got tripped up a little in the first chapter (which covers tripwire), because I tried downloading and compiling the tripwire source found at the tripwire web site. I obtained the source from a couple of recommended sites. In one instance tripwire failed to compile correctly, in another it compiled but kept segfaulting when I tried to initialize the database. It wasn't until after I emailed O'Reilly that I saw mention further in Chapter 1 that tripwire is included with Red Hat Linux. One of the authors, Daniel J. Barrett, also emailed me to tell me that it was on the third CD - doh! The upside of this little tale is that I got to know aide (another intrusion detection system) a little better after I installed it on my Debian-based notebook.
... it is certainly money well spent.Read more ›
This recent book by OReilly is hence timely. Concise, with a good contents and index. The authors write clearly, in what may be considered a "standard" cookbook style. Each problem is summarised, and a brief but entirely adequate how-to answer is then given. It is part of this style that they do not go into the theory of public/private key encryption, for example. But they readily provide references to fuller discussions on many topics.
Checking the index for comprehensiveness revealed one curious omission. There is no entry for "virus". While it seems like a glaring oversight, I think the authors are correct in doing so. Antivirus software exists, and you would merely have to run it against a set of files. And this software is not usually part of an operating system. Also, most viruses are written for Microsoft desktops. Thus far, linux viruses are actually pretty rare.
The title says "Linux". Actually, if you are running any major unix (Solaris, HPUX...), don't take that title too literally. The problems you face will often be the same as those described here. The solutions will often likewise be the same. Most unixes now have many utilities in common with each other and linux. You may be able to map an answer given here to a similar approach on your machine.
Most recent customer reviews
The Linux Security Cookbook is a good hands-on guide to the major aspects of securing your Linux box. Read morePublished on April 14 2004 by Lloyd R.
At fewer than 300 pages, the initial size of the Linux Security Cookbook may seem to be meager to cover such a broad subject. Read morePublished on Dec 8 2003 by Ben Rothke
I've been reading "Linux Security Cookbook". I fully understand the goal of this book is to provide lots of little bits of wisdom, not a full fledged security book. Read morePublished on July 28 2003 by Alan Karonen
A very cool collection of recipes for common, daily, security of Linux
systems. Some of the other reviewers missed the point... Read more
The topics that are covered in this book are interesting, but they're not sufficient to secure your machine. Read morePublished on July 23 2003 by Hanno Hentschel
This book was more like a bunch of short articles. Nothing was sufficiently fleshed out, and it certainly wasn't cohesive enough to allow you to secure a machine. Read morePublished on July 22 2003 by Geoffrey Nguyen
Look for similar items by category
- Books > Computers & Technology > Certification Central > Exams > Security+
- Books > Computers & Technology > Networking & Cloud Computing > Network Programming
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Networking & Cloud Computing > Networks, Protocols & APIs
- Books > Computers & Technology > Operating Systems > Linux > Networking & System Administration
- Books > Computers & Technology > Operating Systems > Linux > Programming
- Books > Computers & Technology > Operating Systems > Unix
- Books > Computers & Technology > Programming
- Books > Computers & Technology > Security & Encryption > Linux Security
- Books > Computers & Technology > Software
- Books > Textbooks > Computer Science & Information Systems > Computer Science
- Books > Textbooks > Computer Science & Information Systems > Networking
- Books > Textbooks > Computer Science & Information Systems > Operating Systems
- Books > Textbooks > Computer Science & Information Systems > Programming Languages