Rootkit.nl Logo - By Henry
   Home | Projects | Articles | Security Net | Contributors | Contact | Wishlist  

« Back to articles

Contributors


Non-book contributions


trilightzone.org - offshore anonymous internet services




Book contributors


Digital Design and Computer Architecture
By Chris Burton of the RedSpartan Project

High Availability and Disaster Recovery: Concepts, Design, Implementation
By LogiQwest Inc.


Practice of System and Network Administration, The (2nd Edition)
Donated by Pete and Agnes Cull

Version control with Subversion
Donated by Rob from Sound-o-mat

Mind Performance Hacks: Tips & Tools for overclocking your brain
Donated by Gary Perez

Perl Best Practices
Donated by Jamie Krasnoo

Open Sources 2.0: The continuing Evolution
Donated by Jeffrey Coldberg

Pro OpenSSH (Pro)
Donated by Andrea Angelone

Extrusion Detection : Security Monitoring for internal intrusions
Donated by John R Munoz

Incident Response: A strategic guide to handling system and networksecurity breaches
Donated by James Wetherill

Modern Cryptography: Theory and Practice
Donated by Wim Godden

Synthetic Worlds: The business and culture of online games
Donated by Frans de Wet

Software Securty: Building Security in
Donated by Nikolaj Petersen

Regular Expression Recipes: A Problem-Solution Approach
Contributed by Lew Wolfsohn

Foundations of Cryptography: Volume 1, Basic Tools
Contributed by Ryan Stark of Rackspace

The Design and Implementation of the FreeBSD Operating System
Contributed by Eugene Blanchard

The Best Software Writing I: Selected and Introduced by Joel Spolsky
Contributed by David Zatz

MCSE Self-Paced Training Kit: Microsoft Windows Server 2003 Core Requirements, Exams 70-290, 70-291, 70-293, 70-294
Contributed by Greg of Liveammo.com


Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second edition
Contributed by Evelyn Mitchell of Tummy.com


Amazon Gift certificate
Contributed by Deborah Smith

Incident Response and Computer Forensics, Second Edition
Contributed by Glenn Fleishman

Open Source & Free Software Licensing
Contributed by Jodok Batlogg

TCP/IP Protocol Suite
Contributed by Peter Hickman

Linux Security Cookbook
Contributed by XM Huang of lordsoflords.com

Practical TCP/IP: Designing, Using, and Troubleshooting TCP/IP Networks on Linux and Windows
Contributed by Larry McCarthy

Security Engineering: A Guide to Building Dependable Distributed Systems

Contributed by William Dubeau




HackNotes(tm) Linux and Unix Security Portable Reference

and

The Masters of Deception : Gang That Ruled Cyberspace, The

and

Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses

Donated by Francesco Garofalo of Gigasys




Network Security Assessment by Chris McNab
Donated Shane Hickey of Howsyournetwork

The Backup Book: Disaster Recovery from Desktop to Data Center
Donated by Aric Pedersen

CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide (Exams SECUR,CSPFA, CSVPN, CSIDS, and CSI)
Donated by Peter M. Abraham of Dynamic Net

Web Hacking: Attacks and Defense
Donated by Ed Ewing

The Protocols (TCP/IP Illustrated, Volume 1)
Donated by Barry Skidmore

Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition (Hacking Exposed) Stuart McClure
Donated by Bryon Gibson
Alba Trading

The Ultimate
Security+ Certification Exam Cram 2 Study Kit (Exam SYO-101)

Donated by Jack Koziol


Advanced Ethical Hacking Training

Security+ Certification All-in-One Exam Guide (Gregory White)
Donated by Jeff Huckaby


RackAID

Hacker's Challenge (one and two)
Donated by Kevin Lisciotti

The Ultimate Network+ Certification Exam Cram 2 Study Kit (Exam Cram 2)
Donated by Nico Morrison


Supermail





Last updated by Michael Boelen at 17 December 2009


Lynis Enterprise Suite

This website is also part of our mission to help individuals and companies to secure their systems and comply with regulations. As such, this website is additional guide for the open source community and our users of the Lynis Enterprise Suite:

Complete solution to audit, harden and secure your Linux/Unix environment.

Benefits:
  • Perform audits within a few minutes
  • Central management
  • Powerful reporting
  • Additional plugins and more tests

Lynis Enterprise screenshot
Lynis Enterprise Screenshot: Output of a customized implementation plan

Tell me more »


Testimonials

"A master piece of software and a must for every server admin." - Jose

"Happy installing Lynis on every server I install. Also made some changes for automation and having regular scans of the system. For several customers I made some custom checks on integrity." - Rick Voormolen


About
» About

Thanks to
» Contributors
» Sponsors








Valid XHTML 1.0!


[PHPips enabled]
 
Copyright 2003-2014 Rootkit.nl and Michael Boelen, supported by CISOfy
All rights reserved
Hosted by Shock Media