LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Book Reviews

Linux Security welcomes Robert Slade!
Linuxsecurity.com is proud to be posting book reviews by one of the most respected reviewers in the field of security. Check out his bio and stay posted to Linux Security to catch his next review!

Also, have you read an open source or security-related book lately that you loved or hated?
Send us a review at contribute@linuxsecurity.com, as we are always looking for informative reader reviews.

Linuxsecurity.com also reviews the latest open source and security-related titles sent to us by leading publishers like O'Reilly Press, Addison-Wesley, and NoStarch Press, for whose generosity we are most grateful.


Review: Googling Security: How Much Does Google Know About You
Posted by Burhan Syed   
If I ask “How much do you know about Google?” You may not take even a second to respond. But if I may ask “How much does Google know about you”? You may instantly reply “Wait... what!? Do they!?” The book “Googling Security: How Much Does Google Know About You” by Greg Conti (Computer Science Professor at West Point) is the first book to reveal how Google's vast information stockpiles could be used against you or your business – and what you can do to protect yourself.
 
Review: Hacking Exposed Linux, Third Edition
Posted by Bill Keys   
“Hacking Exposed Linux” by ISECOM (Institute for Security and Open Methodologies) is a guide to help you secure your Linux environment. This book does not only help improve your security it looks at why you should. It does this by showing examples of real attacks and rates the importance of protecting yourself from being a victim of each type of attack.
 
Review: The Book of Wireless
Posted by Bill Keys   
“The Book of Wireless” by John Ross is an answer to the problem of learning about wireless networking. With the wide spread use of Wireless networks today anyone with a computer should at least know the basics of wireless. Also, with the wireless networking, users need to know how to protect themselves from wireless networking attacks.
 
Review: Ruby by Example
Posted by Eckie Silapaswang   
Learning a new language cannot be complete without a few 'real world' examples. 'Hello world!'s and fibonacci sequences are always nice as an introduction to certain aspects of programming, but soon or later you crave something meatier to chew on. 'Ruby by Example: Concepts and Code' by Kevin C. Baird provides a wealth of knowledge via general to specialized examples of the dynamic object oriented programming language, Ruby. Want to build an mp3 playlist processor? How about parse out secret codes from 'Moby Dick'? Read on!

 
Review: Practical Packet Analysis
Posted by Administrator   
Everybody, from seasoned network administrators to people that just use the Internet to check the TV listings, will experience network problems at some point. Despite their varied technical knowledge, there is one tool that everybody can use: Wireshark. What's the quickest way to learn this fantastic tool? Read Practical Packet Analysis, by Chris Sanders, which provides all the basic information anybody needs to start troubleshooting their network.

 
<< Start < Prev 1 2 3 Next > End >>

Results 11 - 15 of 28
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Weekend Edition
How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law
Why Russian hackers are beating us
DQ Breach? HQ Says No, But Would it Know?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.