Resources

  1. Amoroso, Ed. Intrusion Detection. Sparta, NJ: Intrustion.Net Books, 1999.

    Excellent introduction to the subject.

  2. http://web.mit.edu/tytso/www/linux/ext2intro.html

    Card, Rémy, Theodore Ts’o, and Stephen Tweedie. “Design and Implementation of the Second Extended Filesystem.”

    Excellent paper on the LinuxEXT2 filesystem; the section entitled “Basic File System Concepts” is of particular interest to Tripwire users.

  3. Northcutt, Stephen and Judy Novak. Network Intrusion Detection: An Analyst's Handbook. Indianapolis: New Riders Publishing, 2001.

    A very practical book with many examples showing system log excerpts and configurations of popular IDS tools.

  4. http://www.chkrootkit.org/

    Home of the chkrootkit shell script and an excellent source of information about how to detect and defend against rootkits.

  5. http://sourceforge.net/projects/tripwire

    Project pages for Tripwire Open Source. The place to obtain the very latest Tripwire Open Source code and documentation

  6. http://prdownloads.sourceforge.net/tripwire/tripwire-2.3.0-docs-pdf.tar.gz

    Tripwire Open Source Manual and the Tripwire Open Source Reference Card in PDF format. Required reading! (If this link doesn’t work, try http://sourceforge.net/project/showfiles.php?group_id=3130).

  7. http://www.tripwire.org

    Home page for Tripwire Open Source. Binaries for Linux available here.

  8. http://www.tripwire.com/downloads/tripwire_asr/index.cfml?

    Tripwire Academic Source Release download site.

  9. http://securityportal.com/topnews/tripwire20000711.html ...

Get Building Secure Servers with Linux now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.