Hacking Exposed Linux: Linux Security Secrets and Solutions and over one million other books are available for Amazon Kindle. Learn more
  • List Price: $52.00
  • Save: $38.06 (73%)
Rented from RentU
To Rent, select Shipping State from options above
Due Date: Dec 21, 2014
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
FREE Shipping on orders over $35.
Used: Good | Details
Sold by RentU
Condition: Used: Good
Comment: Fast shipping from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. Overnight, 2 day and International shipping available! Excellent Customer Service.. May not include supplements such as CD, access code or DVD.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Qty:1
  • List Price: $52.00
  • Save: $12.54 (24%)
Only 2 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $4.73
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed Linux, 3rd Edition Paperback – July 15, 2008

ISBN-13: 978-0072262575 ISBN-10: 0072262575 Edition: 3rd

Buy New
Price: $39.46
Rent
Price: $13.94
26 New from $23.99 28 Used from $13.44
Amazon Price New from Used from
eTextbook
"Please retry"
Paperback
"Please retry"
$39.46
$23.99 $13.44

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Hacking Exposed Linux, 3rd Edition + Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition + HACKING EXPOSED WEB APPLICATIONS, 3rd Edition
Price for all three: $110.41

Buy the selected items together

NO_CONTENT_IN_FEATURE

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 614 pages
  • Publisher: McGraw-Hill Osborne Media; 3 edition (July 15, 2008)
  • Language: English
  • ISBN-10: 0072262575
  • ISBN-13: 978-0072262575
  • Product Dimensions: 1.3 x 7.2 x 9 inches
  • Shipping Weight: 2.5 pounds (View shipping rates and policies)
  • Average Customer Review: 3.3 out of 5 stars  See all reviews (10 customer reviews)
  • Amazon Best Sellers Rank: #369,542 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

ISECOM (Institute for Security and Open Methodologies) is an open, nonprofit security research organization established in January 2001 with the mission to make sense of security. The research project team involved in the making of this book is also involved in other ISECOM projects such as the Open Source Security Testing Methodology Manual, Hacker Highschool, and the professional security certifications and trainings: OPST, OPSA, OPSE, and OWSE.

Customer Reviews

3.3 out of 5 stars
5 star
3
4 star
3
3 star
1
2 star
0
1 star
3
See all 10 customer reviews
If you are new to Linux security, this book is excellent.
Lene Jensen
They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.
drake
Looking to exploit FTP, SSH, RPC, RLOGIN, TELNET etc?...the book does not cover them from a hacking point of view.
Nobody.

Most Helpful Customer Reviews

39 of 42 people found the following review helpful By Henrik Lund Kramshøj on September 23, 2008
Format: Paperback
I will probably take a lot of heat for this, so let me start by putting on my asbestos suit.

To quote the beginning of this book, page About the authors:
This book was written by multiple authors, reviewers, and editors - too many to all be listed here - who collaborated to create the best Linux hacking book they could.

The best Linux hacking book! Wow I will probably like this book, having already read and used the OSSTMM from ISECOM before.

Then I got very excited reading the praise of the book from Jake Kouns on the front cover, reading praise by Clement Dupuis on the back cover book and browsing the Table of Contents. This book is going to be so much fun reviewing and will probably have me recommending it for future training and courses about Unix/Linux security.

The reason I start saying Unix/Linux, and will soon only say Unix - is that this book tries to cover more than just Linux. Examples include appendices with information about BSD security, listing FreeBSD, NetBSD and OpenBSD information, and also including references to other Unix systems in the book.

I will also use the term Unix, because lets face it there is a lot in common between Unix systems, from Linux to Mac OS X - as anyone will know from reading a real Unix Security book like Practical Unix and Internet Security from O'Reilly - THE BOOK about Unix security.

I was very disappointed, and I have to be true to the wording - the best Linux hacking book. This book is not about hacking Linux, it is more about hacking WITH Linux. Will all respect for the authors I will try to explain why this review is not outright positive.

Let me start by get some problems sorted out immediately.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Lene Jensen on December 12, 2008
Format: Paperback Verified Purchase
I had this on preorder, so I got it the moment it came out. If you are new to Linux security, this book is excellent. It talks about all the things you need to be aware of, and how to protect your systems. I would most definitely recommend it. Unfortunately for me, I knew most of this already. It did have some tidbits I liked, and the security recommendations are most definitely sound. I give it 4 stars, because I had expected more about hacking and less about securing.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
11 of 15 people found the following review helpful By Peter Klee on August 7, 2008
Format: Paperback
This is the first time that I'm not disappointed at all after buying a new edition of a Hacking Exposed book. Yes, it is not a rehash of the 2nd edition. What's wrong about that? Combining the concepts of OSSTMM and Hacking Exposed was a wonderful idea. It's an excellent starting point for both students and professionals. I wish we would see more innovation like this on the security book market.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By Josh Stone on July 14, 2010
Format: Paperback
When I was reading this book, I kept waiting for the topic to be Linux. The book starts with OSSTMM material. You can tell the OSSTMM folks have become too abstract to be concerned with the work-a-day security industry. This is not what I (or, I'm sure, anyone) will expect from a Hacking Exposed book. Imagine a book of definitions, but no examples; references to techniques, but no tools.

The book features large tracts of discussion about OSSTMM, PSTN, ISDN, X.25, VOIP, Wireless (in general, not really Linux), RFID, web-apps (shouldn't that be its own book?), and C code static analysis. There's a whole chapter on hacking the users, without any real discussion of brute force attacks or tools you'd use to hack a Linux system. I was very disappointed.

Where is discussion of kernel- and user-space? Where are hardware abstraction layer boundaries? What about exploiting stacks and heaps in Linux? What are the security implications of Linux dynamic libraries? What about hacking OpenSSH, Apache, Samba, X11, NFS, Kerberos, NIS and other common Linux services?

If you're looking for hands-on Linux exploitation techniques, look elsewhere.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By paul kaiser on November 11, 2009
Format: Paperback Verified Purchase
hacking linux exposed 3rd edition is a complete rewrite and (in my opinion) loses the power of the previous editions.

the first two editions have numerous examples of exploits followed by appropriate strategies for defending against them. the current edition is jargon and alphabet soup found within the field of security. about the only redeeming feature of the latest edition is a concise summary of security software for linux found in the appendix.

i teach linux security (usually in the spring) and i know how difficult it is keep current with examples of exploits. what i demonstrate one year is unavailable the next! however, the red books really attempted to demonstrate the various vulnerabilities the blue book is generality and vocabulary.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search