Table 10-1 provides a few resources for intrusion detection information.
Resource
|
Location
|
---|---|
The Security Quick-Start HOWTO for Red Hat Linux
|
www.ibiblio.org/pub/Linux/docs/HOWTO/other-formats/ pdf/Security-Quickstart-Redhat-HOWTO.pdf
|
Chkrootkit
|
www.chkrootkit.org
|
The Coroner's Toolkit
|
www.fish.com/tct/
|
Building a Security Audit Toolkit
| |
Host Hardening and Intrusion Detection-The Open Source Way
|
www.unixreview.com/documents/s=7459/uni1030462740022/
|
Internet Server Security: The Best Things in Life Are Free, But There's No Silver Bullet
|
www.datacenterhub.com/features/l205_Rackspace_Weeks.
|
Intrusion Detection, Take 2
|
www.nwc.com/1023/1023fll
|
SANS Intrusion Detection FAQ
|
www.sans.org/resources/idfaq/ipe.php
|
Security Focus
|
www.securityfocus.com/
|
CERT Coordination Center
|
www.cert.org/
|
Security mail lists
|
http://seclists.org
|
Security tools
|
www.insecure.org/toolsl
|