Security Strategies in Linux Platforms and Applications (Jones & Bartlett Learning Information Systems Security & Assurance)
N**I
Security strategies in Linux platforms
The media could not be loaded. I’ve been looking for a good textbook on Linux security and I decided to try "Security Strategies in Linux Platforms and Applications," and it's a game-changer! The book offers a comprehensive guide to fortifying Linux systems, covering everything from kernel security to application-layer defenses. The practical tips and real-world examples make it accessible for both beginners and seasoned users. A must-read for anyone serious about safeguarding their Linux environment.
A**R
Good
Great, reasonable price
R**R
Broadly useful information with poor editing
I purchased a physical copy of this book. The content of this book is fairly broad and basic but as somebody previously unfamiliar with Linux security practices this is a decent overview. The editing, however, leaves much to be desired. For example, the Chapter 2 quiz key in the back of the book not only has incorrect answers listed, it also has the wrong number of questions for that quiz. A new edition of this book is scheduled to release in November 2022 and for future readers' sake I hope the editor does a better job.
N**S
in serious need of a proof reader
I doubt that we will remain on top of the industry with poorly written textbooks. In desperate need os]f an editor the author wonders around and frequently loose his train of thought. Spell check does not a writer make...
M**K
the information contained is all very generalized like, "you could do this or that
I had this book for a class on implementing linux security. While I respect the knowledge and authority of Jang (google his name and you'll see the other books he's done) and his coauthor Messier, I did not find the information to be helpful for my home linux systems. As another reviewer stated, the information contained is all very generalized like, "you could do this or that, but it's best to do this." I would have appreciated more examples I could follow along with. I understand that implementing certain hardening techniques comes down to preference and suggesting one thing may not be appropriate for all situations, but for a textbook I would have liked to see more examples. And it needs to be edited again. Example from pg 255, "The mod_security modue (sic) can be a critical component to your Web application architecture."Bottom line: decent book to get your feet wet on the *idea* of linux hardening without concrete examples and steps of implementing those security strategies. It wasn't terrible, just... didn't seem appropriate for a juco textbook.
A**L
Not a technical book about Linux/applications security
Save your money. Do not buy this book...The book is just a collection of general best-practices that anyone can find using google.- No real-word examples in the book- No intrusion detection howto- No scripts ready to use, no handy labs, etc.- How to secure Cloud, OpenStack, Docker and virtualization, etc..., have not been addressed in this book- Finally, in one word: this book is a bit expensive for nothing...
A**L
A very poor book!
Save your money, do not buy this book. It's really a very poor book on Linux/Application security. The book contains only a general recommandations/principles related to security that you can find in any forum, blogs, etc. retated to security. There is no in depth analysis, no a real-world examples, no intrusion detection examples, and no scripts ready to be used...
Trustpilot
2 months ago
2 weeks ago