About > Computing & Technology > Internet/Network Security > Book Reviews > Guide Reviews > Book Review: Hacking Linux... 
Search      Web Hosting 
 Hi, I'm Tony Bradley, your Guide to Internet/Network Security. I can help you find what you need to know about Internet/Network Security.   

Internet/Network Security

with Tony Bradley
Your Guide to one of hundreds of sites
 Home · Articles · Forums · Chat · Newsletters · Help    
 · Free Tools
 · Submit Quiz Question
 · Computer Security 101
 · What Is A Firewall?
 · Glossary

Top Picks
Polls & Quizzes

Tools & Utilities
Book Reviews
Product Reviews
Security Blogs

General Security
Comp Security 101
Security FAQ
Wireless Security
Email Security
Windows 9x
Windows NT / 2000
Windows XP
Mac Security
Linux Security

Disaster Recovery
Hacker Tools

Subject Library

All articles on this topic

Stay up-to-date!
Subscribe to our newsletter.
New from About.com!
Get Paid to Improve Search
Find Results Now:
Social Security
Book Review: Hacking Linux Exposed - 2nd Edition
Guide Review
Hacking Linux Exposed
Guide Rating -  rating
Pros  • Cream of the crop for Linux security books
• Excellent addition to the Hacking Exposed series
• Sample commands and illustrations very helpful
Cons  • None
The Bottom Line - Linux is often touted as "more secure" than Windows by its fans. The truth is that it is just as vulnerable, maybe moreso, if you don't configure it properly to be secure. This book will help you.

• Follows the best-selling and popular format of the Hacking Exposed books
• Command line examples help users to instantly apply the lessons and see results on their own systems
• Comprehensive list of hacking exploits along with creative and effective countermeasures
• Indispensable resource for anyone who administers a Linux box
• Provides detailed explanations of hacks and vulnerabilities understandable by all levels of audience
Guide Review - Book Review: Hacking Linux Exposed - 2nd Edition

The Hacking Exposed books have set the bar for this genre of security book. Hacking Linux Exposed - 2nd Edition doesn't fail in meeting that bar as well. If you've read Hacking Exposed - 4th Edition and think this book can't tell you anything you don't already know- think again. For those who administer Linux boxes this book provides an in-depth look at specific hacks and vulnerabilities unique to the Linux operating system and the accompanying fixes and workarounds to protect yourself. The book is overflowing with examples and sample commands that users can immediately put to use to better understand the risks and how to mitigate them. Hacking Exposed is a must-read for security- this book is a must-read for Linux security.
 ~ Tony Bradley, CISSP, MCSE2k, MCSA, A+
Related Guide Picks
• Hacking Exposed - 4th Edition
• Know Your Enemy
• Have You Locked The Castle Gate?
• Practical Unix & Internet Security
• Security Planning & Disaster Recovery
 Related Resources
• Rootkits: Stealth Hacking
• Sub7 Trojan/Backdoor Overview
• Are You Breaking The Law?
• Virus Writing 101
• Help! I Think I've Been Hacked!!
Important product disclaimer information about this About site. 

Email this page!

 Sponsored Links

Pass Your Security It Exams with Transcender
Learn the material you need to know to pass your security IT certification exams with Transcender exam simulations and video CBTs. Be confident you are ready to pass. Download a free demo now!
http://www.transcender.com/    Sponsored Link

Earn Your Degree in IT Online - Capella University
Set yourself apart from the rest of the techies. Earn your IT degree online from Capella University. Specializations include Network Technology, Project Management, Information Security, and more.
http://www.capella.edu    Sponsored Link

Block Annoying Spam with SpamAgent
SpamAgent is a new and powerful spam prevention tool. Get the email you want - and nothing more. SpamAgent has a comprehensive set of filters that block spam - before they reach your inbox!
http://www.discountsoftwaredeals.com/    Sponsored Link

Catch Hackers Red-Handed! GFI LANguard
GFI LANguard Security Event Log Monitor collects and analizes security event logs network-wide. Automates Windows event log analysis and reporting. Intrusion detection via real-time alerts.
http://www.gfisoftware.com/    Sponsored Link

Record Your Employees Network Activity
Secretly record all your employees computer and internet activity. Spector records e-mails, chats, instant messages, web sites visited, keystrokes typed.
http://www.spectorsoft.com/    Sponsored Link

Buy a Link Now!


Explore More on the About Network!
Related Sites
Antivirus Software
Computer Networking
Electronic Commerce
Focus on PC Support
Focus on Windows
Ghostly Guests
Want a terrifying trip? Hotels Guide Gary L. Chisholm Jr. helps you find a haunted hotel.
Student Discount
Amtrak plans fall sale for college-bound students. U.S. Government Guide Robert Longley reports.
Plan for a Van
Family Cars Guide Bob Schulties explains why a minivan might be right for your clan.
Search About
About Us | Advertise on This Site | User Agreement | Privacy Policy | Kids' Privacy Policy | Help
Copyright  © 2003 About, Inc. About and About.com are registered trademarks of About, Inc. The About logo is a trademark of About, Inc. All rights reserved.