LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Book Reviews

Linux Security welcomes Robert Slade!
Linuxsecurity.com is proud to be posting book reviews by one of the most respected reviewers in the field of security. Check out his bio and stay posted to Linux Security to catch his next review!

Also, have you read an open source or security-related book lately that you loved or hated?
Send us a review at contribute@linuxsecurity.com, as we are always looking for informative reader reviews.

Linuxsecurity.com also reviews the latest open source and security-related titles sent to us by leading publishers like O'Reilly Press, Addison-Wesley, and NoStarch Press, for whose generosity we are most grateful.


Review: Absolute PC Security and Privacy
Miller never knew much about viruses, or took them seriously, until a friend got infected and it turned out to be more of a nuisance than he thought. So he decided to write a book about them. And also about spam, since he was annoyed by that, too.
 
Book Review: Honeypots: Tracking Hackers
Knowing essentially nothing about honeypots and the honeynet project going into this book, I thought I was going to have some difficulty grasping the concepts. Even worse, I thought I was going to have to do some extra reading to understand the book. I was nothing short of completely incorrect.

 
LinuxSecurity.com Reviews the Honeynet Project's Know Your Enemy Book
The Honeynet Project's first book details how a honeynet works, how to analzye the data once captured, how to prevent the honeynet machine from becoming a point to launch an attack on another network, and even a full account of a discussion between blackhats as they plot their next attack.

 
<< Start < Prev 4 5 6 Next > End >>

Results 26 - 28 of 28
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mozilla reports user data leak from Bugzilla project
These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.