4.5. Further Reading

We've found the following books useful in determining how to secure a daemon.

  • Secure Programming for Linux and Unix HOWTO by David A. Wheeler (http://www.dwheeler.com/secure-programs, 2003)

  • Real World Linux Security by Bob Toxen (Prentice Hall, 2000)

  • Network Security Hacks by Andrew Lockart (O'Reilly, 2004)

  • SSH, The Secure Shell: The Definitive Guide by Daniel J. Barrett and Richard E. Silverman (O'Reilly, 2001)

  • Linux Security by Shadab Siddiqui (Premier Press, 2002)

Get Linux Appliance Design now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.