"You have in your hands a book I've been waiting to read for yearsa practical, hands-on guide to hardening your Linux system."From the foreword by Eric S. Raymond Safeguard your Linux systems against today's most vicious attacks! Realistic, step-by-step techniques from one of the world's leading Linux security experts Covers IP Tables, ARP attacks, adaptive firewalls, VPNs, wireless networks, Samba, monitoring, 2.4 kernel security, and much more Quick and effective recovery from intrusions Web site contains important new tools for monitoring networks and locking out hackers "A comprehensive guide to system security: covers everything from hardening a system to system recovery after an attack."Steve Bourne, Creator of the Bourne Shell Stop today's most vicious Internet attackersright in their tracks! Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or network, and fighting off any intrusion. Top Linux security consultant Bob Toxen has thoroughly revamped this definitive guide to reflect today's most vicious Internet attacksand arm you with breakthrough resources for protecting yourself! Surprising new IP Tables research every netadmin must know about New techniques and software for detecting and blocking ARP and Switch attacks Important enhancements to Linux-based adaptive firewalls Thoroughly revised coverage of Samba security for Windows clients 802.11b wireless networks security How to make the most of Logcheck, Portsentry, and other new monitoring tools VPN and instant messaging security, GNU Privacy Guard, 2.4 kernel issues, and much more Includes all-new chapter on physical security Reviewed by some of the world's leading Linux security experts! Web SiteThe accompanying web site contains the author's own state-of-the-art software for instantly locking out hackers and alerting system administrators. The website contents also include exclusive IP Tables and IP Chains firewall scripts (rule sets), as well as powerful new tools for monitoring network health, detecting and reporting suspicious activities, securing backups, simplifying recovery, and much more.Toxen, Bob is the author of 'Real World Linux Security Intrusion Protection, Detection, and Recovery', published 2002 under ISBN 9780130464569 and ISBN 0130464562.