[856] in Intrusion Detection Systems
Re: Security Books
daemon@ATHENA.MIT.EDU (Synthesizer Punk)
Tue Jan 14 13:57:01 1997
Date: Sat, 11 Jan 1997 15:16:30 -0500 (EST)
From: Synthesizer Punk <anarchy@wasteland.org>
To: ids@uow.edu.au
In-Reply-To: <32D53AA5.3D49@lynx.bc.ca>
Reply-To: ids@uow.edu.au
The book in question by whatshisname at Lucent "Repelling the Wily
Hacker" is a quite amazing book. I've been reading it on and off for a
few months when I'm bored at work, and I've learned a few things from it
(even a few outdated things). If you're looking for security I suggest
you grab that book (look for the comic on the cover) and look for the
Practical Unix Security book by ORA (O`Reilly and Associates
http://www.ora.com).. they're both quite good reads.
.------------------------------------- ---- -- - - - -
| Synthesizer Punk - Chto takoe xorocho a chto takoe ploho?
| http://www.firestarter.org - ftp://ftp.firestarter.org
| mailto:anarchy@wasteland.org - irc://irc.wasteland.org
`------------- ------ ---- -- - - - -
On Thu, 9 Jan 1997, Akadi wrote:
> Why does every security book that use the words 'wily' and 'hacker' do
> so well? *grin*
>
>