1. Linux Security Overview -- 2. Proactive Measures and Recovering from a Break-In -- 3. Mapping Your Machine and Network -- 4. Social Engineering, Trojans, and Other Hacker Trickery -- 5. Physical Attacks -- 6. Attacking Over the Network -- 7. Abusing the Network Itself -- 8. Elevating User Privileges -- 9. Password Cracking -- 10. How Hackers Maintain Access -- 11. Mail and FTP Security -- 12. Web Servers and Dynamic Content -- 13. Access Control and Firewalls -- App. A. Keeping Your Programs Current -- App. B. Turning Off Unneeded Services.