O'Reilly logo

Hacker Techniques, Tools, and Incident Handling by Michael Gregg, Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Linux, Live CDs, and Automated Assessment Tools

IN TODAY'S BUSINESS ENVIRONMENT, it is likely that you will encounter operating systems other than the familiar Windows desktop. While Windows still lays claim to a large segment of the computers in the world, it is not the only operating system out there: Operating systems (OSs) such as the Mac OS, UNIX, and Linux are likely to cross your path at some point.

As a security professional, it is important for you always to have an understanding of the tools available to you, and in the security field this requires some knowledge of the Linux OS. Linux is different from Windows and will require some effort from you to learn, but once it is learned you will have many more tools available to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required