Buy Used
+ £2.80 UK delivery
Used: Very Good | Details
Sold by owlsmart_usa
Condition: Used: Very Good
Comment: Pages are clean and free of writing and or highlighting. Cover edges show some wear from reading and storage.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

HackNotes Linux and Unix Security Portable Reference Paperback – 1 Jul 2003

5.0 out of 5 stars 1 customer review

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
£15.33 £0.61
click to open popover

Special Offers and Product Promotions

Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your mobile phone number.

Product details

  • Paperback: 224 pages
  • Publisher: McGraw-Hill Osborne (1 July 2003)
  • Language: English
  • ISBN-10: 0072227869
  • ISBN-13: 978-0072227864
  • Product Dimensions: 15.2 x 1.4 x 22.6 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 1,742,688 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

From the Back Cover

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and easy-to-access Reference Center in the middle of the book to quickly locate useful commands, online security resources, and more!

  • Explore counter intrusion tactics such as password brute-forcing, TCP-hijacking, man-in-the-middle attacks, and more
  • Learn to use the latest hacking tools, including Airsnort, Dsniff, Ettercap, Ethereal, Kismet, Netcat, and Nmap
  • Protect against privilege escalation attacks
  • Protect the most popular network services, including FTP, SSH, Telnet, SMTP, HTTP, HTTPS, R-Services, NFS, Samba, POP, IMAP, MySQL, X, and VNC
  • Recognize both Backdoor and Rootkit tools and tactics used by sophisticated intruders
  • Learn in-depth and current Linux and Unix system hardening guidelines
  • Defend against software vulnerabilities such as race conditions, improper input validation, and misconfigurations
  • Write custom plug-ins for Nessus, the popular and free vulnerability scanning tool
  • Understand the latest wireless (802.11) hacking techniques, tools, and defenses

About the Author

Nitesh Dhanjani (Belleview, WA) is an information systems security consultant for Foundstone. He has had over 6 years of experience with system administration and information security. Prior to joining Foundstone's team, Nitesh was involved with the development of various Linux loadable kernel modules. He continues to be active with systems programming. Nitesh has also worked with Ernst & Young LLP where he performed various attack and penetration reviews for many significant companies in the IT arena. Nitesh graduated from Purdue University with both a Bachelors and Masters in Computer Science. While at Purdue, he was involved in numerous research projects with the CERIAS(Center for Education and Research in Information Assurance and Security) team. He also helped teach C and C++ courses. Mike Horton (Seattle, WA), series editor for the HackNotes[trademark] series, is an information systems security consultant for Foundstone, with an emphasis on secure system design, security architecture, operational security and ethical hacking. Prior to joining Foundstone, Mike was the Founder and Chief Technology Architect for Mercury Prime, a provider of secure real-time communication software. Previously, Mike was a senior consultant with Ernst & Young LLP where he was responsible for their ethical hacking and security architecture solutions services. Mike has performed numerous ethical hacking exercises for many significant companies in the IT and business arenas.

Customer Reviews

5.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback
I found this a good quick reference book. An entry typically details an attack in clear steps and a mitigation technique for defending against the attack. It's quick, clear and to the point.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on (beta) HASH(0x9ae75abc) out of 5 stars 7 reviews
3 of 3 people found the following review helpful
HASH(0x9ae2060c) out of 5 stars Excellent material 11 July 2003
By Dave Geare - Published on
Format: Paperback
The description of this book does not do it justice. I didnt expect much but mainly purchsed it because I liked the sound of the titles of its special chapters in Wireless hacking, NASL programming (for Nessus), and hacking with the Zaurus PDA.
At first glance, I wasnt sure how much material was presented. But after reading the first page or two, I realized the the purpose of the book, which is to give to-the-point information on topics such as enumeration, footprinting, remote hacking, privilege escalation, host hardening, etc. I have compared it to the other security books I already own, and this book seems to contain much more information in only about 200 pages! Since I am a sysadmin and have to travel a lot, I carry this book around with me in my laptop bag. I have only owned it for 2 days and have looked it up for reference material a bunch of times already. Good stuff. I highly recommend it, and watch out for the clever hacking techniques and goodies presented in the remote hacking chapter.
3 of 3 people found the following review helpful
HASH(0x9ae20660) out of 5 stars Short and right to the point 24 July 2003
By Roy Lo - Published on
Format: Paperback
There are quite a few secucity related books out there nowdays. But most of them is just way too thick for me, to make matters worse those books are often filled with repeated or unwanted information. However, this book is different; it cuts right to the point and present me just the right amount of information that I wanted to know. At the same time, it is thin enough so I can carry it around with me.
As a unix sysadmin I think this is one of those books that should go right next to the "Unix System Administration Handbook" on bookshelfs.
This is a must have book for people who cares or want to know more about security.
2 of 2 people found the following review helpful
HASH(0x9ae20a98) out of 5 stars Well done 15 Oct. 2003
By Daniel Rice - Published on
Format: Paperback
Got this book after I read a recent review. I found this book to contain some pretty cool attack & penetration techniques. Chapters like the one on NASL and the Zaurus PDA hacking are a nice addition.
Since this is a hacking book, I disagree with the one review on here that complained about it not being complete. As far as the a&p techniques go, this book packs in more info than most 400+ hacking books I own. Saves a lot of desk real estate and also time. I really dont want to read 5 pages telling me what a portscan is, just tell me how to do it. I prefer it over the Hacking Exposed Linux book when I need quick and precise answers. This book helps me with just this. Right to the point, and some very cool techniques!
5 thumbs up.
2 of 2 people found the following review helpful
HASH(0x9ae20e64) out of 5 stars useful and informative 29 July 2003
By A Customer - Published on
Format: Paperback
My favourite section of the book is 'Remote Hacking'which is a good 50 pages long. What I liked about this chapter is that it shows exactly howto use security tools to break into unix and linux servers. The other sections are interesting also. I highly recommend this book.
3 of 4 people found the following review helpful
HASH(0x9ae20bf4) out of 5 stars Too short, too many ommisions 14 Oct. 2003
By Sec Var - Published on
Format: Paperback
While I understand the publisher's goal is to have some shorter, more consise hacking/cracking/security books, at least this book in the series has problems fulfilling that promise. I'd strongly recomend sticking with their Hacking Linux Exposed, Second Edition title, which is much more complete. HN:LUSPR is not portable (it's still 200 some pages) contrary to the title, so what's the point in something that doesn't take time to delve into security in enough depth? Reading just this book will leave huge holes in your security posture.
Were these reviews helpful? Let us know