[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[no subject]
- <!--x-content-type: text/plain -->
- <!--x-date: Sun Apr 25 18:20:14 2004 -->
- <!--x-from-r13: obo ng irelfrpheryvahk.pbz (Pbo Fbkra) -->
- <!--x-message-id: [email protected] -->
- <!--x-reference: [email protected] -->
- <!--x-reference: 7571065D-9411-11D8-9D18-[email protected] -->
- <!--x-reference: [email protected] -->
- <!--x-reference: [email protected] -->
- <!--x-reference: [email protected] --> "http://www.w3.org/TR/html4/loose.dtd">
- <!--x-subject: [ale] Linux Security -->
- <li><em>date</em>: Sun Apr 25 18:20:14 2004</li>
- <li><em>from</em>: bob at verysecurelinux.com (Bob Toxen)</li>
- <li><em>in-reply-to</em>: <<a href="msg00913.html">[email protected]</a>></li>
- <li><em>references</em>: <<a href="msg00895.html">[email protected]</a>> <<a href="msg00907.html">[email protected]</a>> <<a href="msg00908.html">[email protected]</a>> <<a href="msg00909.html">[email protected]</a>> <<a href="msg00913.html">[email protected]</a>></li>
- <li><em>subject</em>: [ale] Linux Security</li>
> I agree with Dow, I've got both editions. It is, with out a doubt, the
> most comprehensive book on Linux security I've seen, and I've got a
> number of them. You can use both as a learning tool and a reference doc.
You might post a referral on Amazon's page for "Hacking Linux Exposed"
recommending RWLS instead.
The second edition has *all* of the information on IP Chains that the
first edition had plus IP Tables plus extensive advice on debugging and
design.
> --
> Until later, Geoffrey Registered Linux User #108567
> Building secure systems in spite of Microsoft
Bob Toxen
bob at verysecurelinux.com [Please use for email to me]
<a rel="nofollow" href="http://www.verysecurelinux.com">http://www.verysecurelinux.com</a> [Network&Linux/Unix security consulting]
<a rel="nofollow" href="http://www.realworldlinuxsecurity.com">http://www.realworldlinuxsecurity.com</a> [My book:"Real World Linux Security 2/e"]
Quality Linux & UNIX security and SysAdmin & software consulting since 1990.
"Microsoft: Unsafe at any clock speed!"
-- Bob Toxen 10/03/2002
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<ul><li><strong>References</strong>:
<ul>
<li><strong><a name="00895" href="msg00895.html">[ale] Linux Security</a></strong>
<ul><li><em>From:</em> dhurst at kennesaw.edu (Dow Hurst)</li></ul></li>
<li><strong><a name="00907" href="msg00907.html">[ale] Linux Security</a></strong>
<ul><li><em>From:</em> ryan at jimmyether.com (Ryan Williams)</li></ul></li>
<li><strong><a name="00908" href="msg00908.html">[ale] Linux Security</a></strong>
<ul><li><em>From:</em> griffisb at bellsouth.net (BruceG)</li></ul></li>
<li><strong><a name="00909" href="msg00909.html">[ale] Linux Security</a></strong>
<ul><li><em>From:</em> dhurst at kennesaw.edu (Dow Hurst)</li></ul></li>
<li><strong><a name="00913" href="msg00913.html">[ale] Linux Security</a></strong>
<ul><li><em>From:</em> esoteric at 3times25.net (Geoffrey)</li></ul></li>
</ul></li></ul>
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg01103.html">[ale] Server room issues</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg01105.html">[ale] diagnosis</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg00913.html">[ale] Linux Security</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg00891.html">[ale] Palm 2MB PDA, Zire Handheld</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#01104"><strong>Date</strong></a></li>
<li><a href="threads.html#01104"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>