4.5. Further Reading
We've found the following books useful in determining how to secure a daemon.
Secure Programming for Linux and Unix HOWTO by David A. Wheeler (http://www.dwheeler.com/secure-programs, 2003)
Real World Linux Security by Bob Toxen (Prentice Hall, 2000)
Network Security Hacks by Andrew Lockart (O'Reilly, 2004)
SSH, The Secure Shell: The Definitive Guide by Daniel J. Barrett and Richard E. Silverman (O'Reilly, 2001)
Linux Security by Shadab Siddiqui (Premier Press, 2002)