Hacking Linux Exposed

Hacking Linux Exposed deals with security-related threats to Linux systems.

Hacking Linux Exposed is a good read and a great introduction to computer security on the Linux platform. More than that, it is a great reference work for the more experienced systems administrator. As the authors fairly quickly jump to rather technical material and assume some knowledge of both networking and Linux systems, the book is not ideally suited for the complete Linux neophyte. However, I am of the firm opinion that for a freshman wanting to learn more, the book is perfectly suited as a guide to further reading.

I'm not overly sure I'd recommend the book as a general introduction for those completely new to computer security. For that I'd recommend a book like Hacking Exposed, which is a better all-around introduction to computer security. Don't let the two books' similarities in cover and title fool you. There are major differences between them. The problem with Hacking Exposed is that it's somewhat lacking in the department of Linux-specific solutions. Hacking Linux Exposed amends this. The two books should be considered complementary.

Hacking Linux Exposed is easy to read. The authors have done a very good job of providing an overview of security-related threats to the Linux platform and how best to avoid falling prey to them. As such, I greatly recommend the book to systems administrators and Linux users who want to learn more about how to secure their systems.

The Good/The Bad

Thomas Østerlie (thomas.osterlie@consultit.no) is a consultant with Norwegian-based consulting company ConsultIT A/S, where he works with server-side systems development for UNIX platforms and with computer security.


One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix