[856] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Security Books

daemon@ATHENA.MIT.EDU (Synthesizer Punk)
Tue Jan 14 13:57:01 1997

Date: Sat, 11 Jan 1997 15:16:30 -0500 (EST)
From: Synthesizer Punk <anarchy@wasteland.org>
To: ids@uow.edu.au
In-Reply-To: <32D53AA5.3D49@lynx.bc.ca>
Reply-To: ids@uow.edu.au


        The book in question by whatshisname at Lucent "Repelling the Wily
Hacker" is a quite amazing book.  I've been reading it on and off for a
few months when I'm bored at work, and I've learned a few things from it
(even a few outdated things).   If you're looking for security I suggest
you grab that book (look for the comic on the cover) and look for the
Practical Unix Security book by ORA (O`Reilly and Associates
http://www.ora.com).. they're both quite good reads.


.------------------------------------- ---- --  -   -    -     -
| Synthesizer Punk - Chto takoe xorocho a chto takoe ploho?
| http://www.firestarter.org - ftp://ftp.firestarter.org
| mailto:anarchy@wasteland.org - irc://irc.wasteland.org 
`------------- ------ ---- -- -   -      -          -

On Thu, 9 Jan 1997, Akadi wrote:

> Why does every security book that use the words 'wily' and 'hacker' do
> so well? *grin*
> 
> 

home help back first fref pref prev next nref lref last post