Discover How To Secure My Network HOWTOs
How Did That Happen? Linux Security Exploits
The purpose of this book is to provide ways to make it difficult to break in initially as well as to detect the evidence of the attack quickly. But you must not use this book, or any other books, as your only resource of information for this purpose.
Using Linux Scripts to Monitor Security
This paper will show how to use basic Linux scripting to create a reusable network security monitor that is easy to use and easy to maintain.