Linux Security HOWTO
by K. Fenzi, D. Wreski
Publisher: Linuxtopia 2004
This document covers some of the main issues that affect Linux security. General philosophy and net-born resources are discussed. This document is not meant to be a up-to-date exploits document. It will tell you where to look for such up-to-date information, and will give some general methods to prevent such exploits from taking place.
Home page url
Download or read it online for free here:
by Jim Lehmer - O'Reilly Media
Linux systems are everywhere today. If you’re a sysadmin, network administrator, or developer in a small Windows shop, you may have to jump in and fix a system problem when your site goes down. This short guide provides tips to help you survive.
by Jeff Dike - Prentice Hall
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and test security.
by Martin A. Brown
This guide provides an overview of many of the tools available for IP network administration of the linux operating system. It covers Ethernet, ARP, IP routing, NAT, and other topics central to the management of IP networks.
by Steve Frampton
This documentation will attempt to summarize the installation and configuration, as well as the day-to-day administrative and maintenance procedures that should be followed to keep a Linux-based server or desktop system up and running.