Media praise for Linux Security Cookbook

"Some books tend to sit on the shelf gathering dust until needed while others see regular use. When owned by a security-conscious individual, this book should fall into the latter category. At the end of the book comes some welcome advice on what to do if you suspect or discover that your system has already been hacked, and how to file an official incident report with the proper authorities. If you follow the advice within [this book], you should not have to put these last tips into practice."
--Computer Shopper, July 2004

"Make sure there is room in your budget for this book. If it saves you from one single hack or a system going haywire it is well worth the cost...I have to say that this is one of the absolute best books I have ever read on the subject and possibly the best I have ever seen from O'Reilly."
--Bryian Winner, Southeast Ohio Macromedia User Group, December 2003

"The book is a winner from a number of standpoints. If you're new to Linux or Security, the foundations are there to build a broader understanding of either subject, particularly if you tend towards a 'hands-on' learning style. If you are more theoretically inclined, Michael Bauer's 'Building Secure Servers with Linux' (O'Reilly) certainly makes a nice compliment. The other place the book shines is that you don't need to be a Linux or Security 'expert' to benefit from it either. The 'recipes' the book includes are step-by-step with clear examples that make the information as a whole very accessible and ready to use...I would recommend it confidently."
--Marcel Lecker, Calgary Linux Users Group, September 2003

"First off I have to note that this is not a typical book on Linux security. You won't find any comprehensive overviews but rather hands-on down 'n dirty instructions on how to complete various tasks...The authors managed to put together a collection of easy-to-follow recipes that are very valuable to anyone interested in Linux security. As you may have noticed from the review, they packed a plethora of knowledge into a rather small amount of pages. This is excellent as it makes the book very portable and assures you that you get only the essential information when you need it. All in all, an excellent reference guide for anyone working with Linux."
--Mirko Zorz, Help Net Security, September 2003

"In the end, the authors do a great job in providing the user a practical overview of the issues at play in securing a Linux installation. Like any good culinary cookbook, the reader should feel the urge and the confidence to try one's hand at a recipe and have a reasonable degree of confidence in the outcome. Linux Security Cookbook is no exception. There is lots here to work with and will give the aspiring Linux cook lots to experiment with. I would recommend it confidently."
--Marcel Lecker, Calgary Linux Users Group, October 2003

"The authors are quite clear and concise when explaining their security philosophy, with a philosophy for each tool being presented at the beginning of a few chapters. They even point out where they may disagree with some of the other experts (sorry no names given) and why. This makes for a positive learning experience to go along with the recipes. Overall, I really enjoyed this book and I am working on implementing some of the ideas presented in it. The read is enjoyable and information and worth the price, $39.95 US or $61.95 CDN. Compared to other books of this genre this is indeed a value. I give The Linux Security Cookbook 5 W’s out of 5."
--Daniel Christle,, November 2003

"This book is an excellent resource for users and administrators of Linux to help secure and monitor their systems...the 'Linux Security Cookbook' provides a number of 'recipes' you can follow to get the desired end result--a more secure system. It includes coverage of firewalls (iptables and ipchains), permissions and authorization controls, intrusion detection and more. Linux users should read this book."
--Tony Bradley,, August 2003

"From various file-integrity techniques, to encryption, authorization, monitoring and logs, the book includes many 'recipes,' or examples. These include keystrokes, shell code and explanations that focus on different aspects of Linux security. Each recipe contains the problem, solutions and discussion for the various topics. The authors describe the techniques in detail and say where to get teh application or utility used in solving the problem. This is a great reference book for intermediate and seasoned systems administrator."
--Mathias Thurman, Computerworld, August 2003,10801,83821,00.html

"The 'Linux Security Cookbook' covers a wide range of potential security problems and it presents its solutions such that each takes only a few minutes to implement...If you don't have an intrusion detection system, need to grant some of your users limited root privileges, have been using the default firewall rules (or don't have a clue about iptables/ipchains), haven't checked your system for root kits or insecure protocols, then the 'Linux Security Cookbook' should be at the top of your reading list."
--Charles McColm,, July 2003

"The 'Linux Security Cookbook' has proved itself to be an indispensible reference for the standard security practices. Just as with any other problem that requires a solution in the open source community, there are usually multiple ways of solving it. With recipes covering a wide variety of tools, it is not difficult to find the solution with a tool that best suits you...I recommend that anyone who has the slighest interest or necessity for security get their hands on a copy of the 'Linux Security Cookbook.' It will become an integral part of your security reference collection."
--Eric Lubow,, July 2003

"While a beginning Linux administrator may benefit from a book that talks about security from a theoretical level, most will fall head-over-heels in love with the material presented in 'Linux Security Handbook.' It wastes no time in jumping into the material and delivering 197 solutions in a book that is only a little over 300 pages long. I highly recommend this book for every intermediate to advanced Linux administrator and assure you that this book contains something that you had yet to think of, and will readily put to use."
--Emmett Dulaney,, July 2003