Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Hacknotes Linux and Unix Security Portable Reference Book

ISBN: 0072227869

ISBN13: 9780072227864

HackNotes(tm) Linux and Unix Security Portable Reference

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: Good

$6.29
Save $23.70!
List Price $29.99
Almost Gone, Only 1 Left!

You Might Also Enjoy

Hacking: The Next Generation
Hacking: The Next Generation
Billy Rios, Nitesh Dhanjani, Brett Hardin

from: $5.19

Gray Hat Hacking: The Ethical Hacker's Handbook
Gray Hat Hacking: The Ethical Hacker's Handbook
Daniel Regalado, Michael Baucom, Shon Harris, Chris Eagle, Jonathan Ness, Allen Harper

from: $6.49

Network Security Tools: Writing, Hacking, and Modifying Security Tools
Network Security Tools: Writing, Hacking, and Modifying Security Tools
Justin Clarke, Nitesh Dhanjani

from: $7.29

Linux in a Nutshell
Linux in a Nutshell
Stephen Figgins, Robert Love, Ellen Siever, Stephen Spainhour, Aaron Weber

from: $5.19

Hacking For Dummies
Hacking For Dummies
Kevin Beaver

from: $6.19

Secrets and Lies: Digital Security in a Networked World
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier

from: $5.89

Learning the bash Shell
Learning the bash Shell
Cameron Newham, Bill Rosenblatt

from: $6.59

The C++ Programming Language
The C++ Programming Language
Bjarne Stroustrup

from: $4.99

CompTIA Network All-In-One Exam Guide
CompTIA Network All-In-One Exam Guide
Mike Meyers

from: $5.19

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard, Marcus Pinto

from: $14.39

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, Nick Sullivan, William L Simon, William L. Simon

from: $5.69

Learning Python
Learning Python
Mark Lutz

from: $6.49

Discrete Mathematics and its Applications
Discrete Mathematics and its Applications
Kenneth H. Rosen

from: $8.39

CISSP All-in-One Exam Guide
CISSP All-in-One Exam Guide
Shon Harris

from: $5.49

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson

from: $6.09

CompTIA Security+ Deluxe Study Guide
CompTIA Security+ Deluxe Study Guide
Don Kurz

from: $6.69

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Kevin D. Mitnick

from: $9.89

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide
Matt Walker

from: $5.09

Book Overview

Helps you to safeguard your systems from all types of hackers, hijackers, and predators. It provides you just-the-facts coverage of Linux, UNIX and Solaris, and helps you learn about advanced hacking techniques, including buffer overflows, password theory, port re-direction, and more. This description may be from another edition of this product.

Customer Reviews

5 customer ratings | 5 reviews

Rated 5 stars
One of the best Unix/Linux security books I own

I own a lot of security books and I try to keep up with what his happening. After reading a few reviews I had been wanting to buy this book until I attended a conference where the author was singing books. So I got my signed copy and I have to say I am pretty impressed with the material. As other people have mentioned here, the author's attitude is to get right to the point and to provide useful examples wherever possible...

0Report

Rated 5 stars
Well done

Got this book after I read a recent review. I found this book to contain some pretty cool attack & penetration techniques. Chapters like the one on NASL and the Zaurus PDA hacking are a nice addition. Since this is a hacking book, I disagree with the one review on here that complained about it not being complete. As far as the a & p techniques go, this book packs in more info than most 400+ hacking books I own. Saves a lot...

0Report

Rated 5 stars
useful and informative

My favourite section of the book is 'Remote Hacking'which is a good 50 pages long. What I liked about this chapter is that it shows exactly howto use security tools to break into unix and linux servers. The other sections are interesting also. I highly recommend this book.

0Report

Rated 5 stars
Short and right to the point

There are quite a few secucity related books out there nowdays. But most of them is just way too thick for me, to make matters worse those books are often filled with repeated or unwanted information. However, this book is different; it cuts right to the point and present me just the right amount of information that I wanted to know. At the same time, it is thin enough so I can carry it around with me. As a unix sysadmin I...

0Report

Rated 5 stars
Excellent material

The description of this book does not do it justice. I didnt expect much but mainly purchsed it because I liked the sound of the titles of its special chapters in Wireless hacking, NASL programming (for Nessus), and hacking with the Zaurus PDA.At first glance, I wasnt sure how much material was presented. But after reading the first page or two, I realized the the purpose of the book, which is to give to-the-point information...

0Report

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured