|
Firewalls and Internet Security: Repelling the Wily Hacker
Cheswick and Bellovin
An excellent guide that thoroughly explains internet security via
various types of firewall implementations. This book is intended
for readers with a moderate amount of Unix knowledge.
|
|
Practical Unix & Internet Security
Garfinkel & Spafford
A complete reference to Unix security that covers everything from
file permissions to wrappers, firewalls, and more advanced topics.
Suitable for novices.
|
|
Applied Cryptography
Bruce Schneier
The most in-depth crypto book you could ever read, it explains the
workings of practically every kind of cryptosystem in detail. The
book does get somewhat math-intensive, but is accessible to readers
of any level.
|
|
The Underground Guide to Unix
John Montgomery
An excellent beginner's guide to using Unix- complete and easy to
understand. This is the first Unix book I ever purchased.
|
|
Linux: The Complete Reference
Richard Petersen
The title says it all- a virtual bible of Linux information.
Covers everything from the major tools and utilities to the newest
window managers.
|
|
Beginning Linux Programming
Neil Matthew, Richard Stones, S. Stones Matthew
An excellent guide for programmers with a moderate amount of
experience that want to apply their knowledge to Linux. Explains
shell programming, file access, sockets, CGI, and much more.
|
|
The Cuckoo's Egg
Cliff Stoll
A fantastic book detailing one of the most exciting hacker
investigations ever. Stoll is an astronomer that becomes obsessed
with tracking down a hacker named "Hunter" who has invaded one of
his university computers. A must-read.
|
|
The Hacker Crackdown
Bruce Sterling
A classic examination of the hacker subculture, Sterling begins by
exploring the beginning of hacking and then goes on to highlight the
assault on hackers in the 80s and 90s. He also explores both the legal
and ethical issues involved.
|