Buy Used
$0.01
+ $3.99 shipping
Used: Good | Details
Condition: Used: Good
Comment: Book has some visible wear on the binding, cover, pages. Biggest little used bookstore in the world.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Securing Linux: A Survival Guide for Linux Security Paperback – February 1, 2003


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
$90.61 $0.01

Spring Books
The Big Books of Spring
See our editors' picks for the books you'll want to read this season, from blockbusters and biographies to new fiction and children's books.
NO_CONTENT_IN_FEATURE

Best Books of the Month
Best Books of the Month
Want to know our Editors' picks for the best books of the month? Browse Best Books of the Month, featuring our favorite new books in more than a dozen categories.

Product Details

  • Paperback: 104 pages
  • Publisher: SANS Institute (February 1, 2003)
  • ISBN-10: 097242735X
  • ISBN-13: 978-0972427357
  • Product Dimensions: 10.7 x 8.1 x 0.4 inches
  • Shipping Weight: 11.2 ounces
  • Average Customer Review: 4.8 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #4,666,037 in Books (See Top 100 in Books)

Important Information

Ingredients
Example Ingredients

Directions
Example Directions

Customer Reviews

4.8 out of 5 stars
5 star
75%
4 star
25%
3 star
0%
2 star
0%
1 star
0%
See all 4 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

2 of 2 people found the following review helpful By Dr Anton Chuvakin on April 22, 2003
Format: Paperback
The excellent SANS "Securing Linux Step by Step"guide suffers from a
major problem: you can't cut-and-paste the commands from it into your
Linux system! The desire to do so constantly appear while reading the
manual, and I was very eager to try some of the things described
thereof.
The guide presents ultimate hands-on, indeed as step-by-step as they
do. A little of text and a lot of commands to accomplish it! All
configuration "recipes" are supposed to be tested by many of the guide
contributors and reviewers. I have found no inaccuracies of any kind.
Its a pity that there is no way to cut and paste from the book and
click on links too. The guide begs to have a CD, floppy or a companion
site since commands need to be typed on the server.
The book starts from a nice security policy primer and a summary of
security principles, which even touch upon physical security, backups
and other useful operational issues.
The range of advice is wide and covers everything from very basic
passwords security to complicated methods of chrooting various network
daemons for extra security. The complete step-by-step instructions for
chrooting bind and ssh are provided together with several sample
configuration files. Tips on securing many Linux applications such as
Apache, Sendmail, Bind, Samba are also detailed in separate
chapters. Securing Wu-FTPD, however pointless it might be in light of
a flood of attacks, is also described. Its a pity that common
replacements such as qmail, proftpd and djbdns are not covered.
While other books offer more breadth (such as coverage of many
different tools etc), this is ideal for those seeking depth.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By A Customer on April 22, 2003
Format: Paperback
Why does every book on Linux try to tackle too many issues? Let's face it, 700-800 or even a 1000 pages is just TOO much information. If you are looking for a complete and concise guide to securing your Red Hat Linux installation then I HIGHLY recommend picking up this book.
I would rank this as a book that is perfect for intermediate Unix admins but a colleague of mine without ANY Linux experience said she found this book to be a valuable resource in her steep learning curve. The book provides many examples of different configurations and provides great pointers to other resources if you want more information about a particular topic.
All in all, I was VERY impressed with this book and I would consider it a "must have" for anyone interested in securing their Red Hat Linux installations.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By A Customer on March 18, 2003
Format: Paperback
I purchased this book because I had the old version from the Red Hat 6.2 era that was severely outdated. The claim that this guide is a total rewrite is VERY accurate. I found the advice given and the steps provided to be extremely helpful in locking down my linux server.
Perhaps the most useful section for me was dealing with Sendmail. Even with the most recent release, working with the sendmail configuration files is tricky on a good day and downright frightening. I learned a couple of new tricks by following the steps in the guide and now have a better understanding of how the configuration file can be modified to make my email gateway more secure.
I also found the section on RPM's to be extremely helpful. In the past, I struggled with keeping my OS up to date and was actually jealous of the windows users that could "automagically" update their machines. Well, you can do this in Linux too by using up2date or autorpm. Check the guide out on how you can automate this functionality!
While I did find this guide to be extremely useful, it didn't cover EVERYTHING. Heck, that would be impossible given the changing nature of the Linux OS and the thousands of applications or services available but I was really hoping to see more example scripts provided in the appendix. Perhaps this will be covered in version 2.0??
All in all, a very good book and a BEST BUY!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By "bfunkallstars" on May 14, 2003
Format: Paperback
Wow! What a book. Although I know very little about Linux as an OS, even less about security and can barely dress myself, I successfully used this book to set-up a secure, linux-based environment for my top-notch anime collection... All in all, I highly recommend this product...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again