Resources

  1. Amoroso, Ed. Intrusion Detection. Sparta, NJ: Intrustion.Net Books, 1999.

    Excellent introduction to the subject.

  2. http://web.mit.edu/tytso/www/linux/ext2intro.html

    Card, Rémy, Theodore Ts’o, and Stephen Tweedie. “Design and Implementation of the Second Extended Filesystem.”

    Excellent paper on the LinuxEXT2 filesystem; the section entitled “Basic File System Concepts” is of particular interest to Tripwire users.

  3. Northcutt, Stephen and Judy Novak. Network Intrusion Detection: An Analyst's Handbook. Indianapolis: New Riders Publishing, 2001.

    A very practical book with many examples showing system log excerpts and configurations of popular IDS tools.

  4. http://www.chkrootkit.org/

    Home of the chkrootkit shell script and an excellent source of information about how to detect and defend against rootkits.

  5. http://sourceforge.net/projects/tripwire

    Project pages for Tripwire Open Source. The place to obtain the very latest Tripwire Open Source code and documentation

  6. http://prdownloads.sourceforge.net/tripwire/tripwire-2.3.0-docs-pdf.tar.gz

    Tripwire Open Source Manual and the Tripwire Open Source Reference Card in PDF format. Required reading! (If this link doesn’t work, try http://sourceforge.net/project/showfiles.php?group_id=3130).

  7. http://www.tripwire.org

    Home page for Tripwire Open Source. Binaries for Linux available here.

  8. http://www.tripwire.com/downloads/tripwire_asr/index.cfml?

    Tripwire Academic Source Release download site.

  9. http://securityportal.com/topnews/tripwire20000711.html ...

Get Building Secure Servers with Linux now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.