

Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks [Donald A. Tevault] on desertcart.com. *FREE* shipping on qualifying offers. Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks Review: Must have rerference and guide point. - I have purchased quite a few too many books over the years online after reading reviews and often find out the content is shallow and lacking any depth for a technical volume. I have a back ground of ~7yrs in Security Engineering spaning many domains- I found this book an excellent "read" and phenomenal reference resource. You can absolutely tell the author, Donald, is a true engineer at heart when making follow up comments after a few sections saying "You can do xyz, heres how to do it; though it probably wont mean much if you do". I audibly laughed a few times having been in similar situations knowing Donald most definitely had huge smirk when writing that down. A good portion of the content in the book was known to me and yet I still found I was learning and considering some of my strategies in place presently for tackling issues. I really couldn't recommend this book more to anyone- while it considers you know some intermediate concepts it provides approachable and relatable use cases which are easily replicated or modified. Review: Nothing I can think of. - It arrived just fine, in good order. Exactly what I wanted. It will make a fine addition to my Linux library. Now to have it spiral bound to match my other ones for ease of use.



















| Best Sellers Rank | #59,967 in Books ( See Top 100 in Books ) #5 in Linux Programming #7 in Linux Networking & System Administration #24 in Computer Network Security |
| Customer Reviews | 4.9 out of 5 stars 111 Reviews |
M**E
Must have rerference and guide point.
I have purchased quite a few too many books over the years online after reading reviews and often find out the content is shallow and lacking any depth for a technical volume. I have a back ground of ~7yrs in Security Engineering spaning many domains- I found this book an excellent "read" and phenomenal reference resource. You can absolutely tell the author, Donald, is a true engineer at heart when making follow up comments after a few sections saying "You can do xyz, heres how to do it; though it probably wont mean much if you do". I audibly laughed a few times having been in similar situations knowing Donald most definitely had huge smirk when writing that down. A good portion of the content in the book was known to me and yet I still found I was learning and considering some of my strategies in place presently for tackling issues. I really couldn't recommend this book more to anyone- while it considers you know some intermediate concepts it provides approachable and relatable use cases which are easily replicated or modified.
S**E
Nothing I can think of.
It arrived just fine, in good order. Exactly what I wanted. It will make a fine addition to my Linux library. Now to have it spiral bound to match my other ones for ease of use.
C**L
Bring Linux security to the max possible.
Linux is very secure out of the box, but if you want to improve security even more, get this book.
R**L
Essential read for any Linux admin
Our company makes us take the Security+ exam which is a total joke. Would be much better to just have everyone read this book. One of the two or three best Linux books out there. Well written and full of very useful information.
J**S
Everything is in there but Secure Boot info
Information about Secure Boot keys and signing your bootloaders is missing from this book. Other than that it is very educational.
S**Y
Exceptional value derived within the first 10 minutes of this book's arrival
I've read a TON of networking and Linux books, and this is the first time in a long time that a book has delivered value during the first quick-contents-scan I do upon receipt. Not only did I find two "winners" that I will immediately apply to a customer's network, I understood everything I read immediately - no going back to re-read anything. This book does not suffer from the typical "disarray" that other packt publisher titles suffer from - whether due to multiple authors' disjoint writing styles, or hastily-assembled contents cutting too wide a swath of the technology it purports to cover. This book suffers from neither of those two concerns. The singular author has issued this third edition of his work, and it is coherent and singularly-voiced - with humor and obvious knowledge from which he writes. I am impressed with this book, the author and editor(s) behind it. It is definitely well worth the investment!
K**E
Really Good
This is the kind of stuff I would like to see as a college course. Of course I'd also like it to be taught by a teacher with real life experience
D**E
Not long enough!
Excellent material, good coverage and understandable. Just what I needed to get up to speed and set up an rsyslog server.
Trustpilot
1 month ago
2 days ago