-- In-depth security configuration tips and techniques to help eliminate security threats -- Discover common Linux system holes and cracking techniques -- Explore both commercial and open source programs and utilities that can help identify and solve security weaknesses -- Learn about the wide array of tools that crackers have at their disposal to penetrate the Linux system
Books can be attributed to "Anonymous" for several reasons:
* They are officially published under that name * They are traditional stories not attributed to a specific author * They are religious texts not generally attributed to a specific author
Books whose authorship is merely uncertain should be attributed to Unknown.