|Amazon Price||New from||Used from|
Chapter 4 showed me how to detect attacks like keystroke logging.
Thus, this book provides us with technical explanations and references, code snippets, attack descriptions, and useful links on related topics.
If you are looking to build a personal security "toolbox" for linux, then I recommend you consider this book.
Who needs a specialist distro or Vyatta? Get this book and you'll be up and running in no time. I thought the content was presented in a logical manner, concise, clear and very... Read morePublished 6 months ago by D. A. Bentley
Get this book. Do as it suggests, and you'll be shocked at how many burglers are constantly knocking at your door.Published on August 12, 2011 by J. H. Morgan
The authors have created a practical book that can help me become better at security administration. Read morePublished on August 9, 2011 by SK Kim
This was a great book! Helped me understand networking, linux, and iptables better. Michael Rash has written some great software, and this is also a definitive guide on it.Published on September 10, 2009 by Rich
Libraries catering to system administrators will find LINUX FIREWALLS an essential acquisition, discussing the technical aspects of the iptables firewall and Netfilter built into... Read morePublished on January 6, 2008 by Midwest Book Review
If so, this gem will walk you through the process of implementing three low-footprint applications which will create an additional ring of security, decreasing an attackers... Read morePublished on October 31, 2007 by Harvey Muller