4.5. Further Reading

We've found the following books useful in determining how to secure a daemon.

  • Secure Programming for Linux and Unix HOWTO by David A. Wheeler (http://www.dwheeler.com/secure-programs, 2003)

  • Real World Linux Security by Bob Toxen (Prentice Hall, 2000)

  • Network Security Hacks by Andrew Lockart (O'Reilly, 2004)

  • SSH, The Secure Shell: The Definitive Guide by Daniel J. Barrett and Richard E. Silverman (O'Reilly, 2001)

  • Linux Security by Shadab Siddiqui (Premier Press, 2002)

Get Linux Appliance Design now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.