Linux Security Hardening Guide
▸ Books in This List
SSH Mastery: Secure Remote Administration
by Bas van den Berg
Your lifeline — key-based auth, tunneling, ProxyJump, port forwarding, and sshd hardening.
OpenSSH Configuration & Tunneling Guide
by Bas van den Berg
Advanced SSH — complex tunnels, certificate auth, multi-hop connections, and Ansible integration.
Remote Administration Security Guide
by Ethan Marshall
Beyond SSH — VPN solutions, bastion hosts, privileged access management, and session recording.
Network Security Fundamentals
by Ethan Marshall
Network defense — firewalls, intrusion detection, DNS security, DDoS mitigation, and monitoring.
Firewall Configuration: The Complete Guide
by Miles Everhart
Deep dive into firewall management — iptables, nftables, firewalld, and zone-based policies.
Linux Backup Automation with rsync & Borg
by Bas van den Berg
Last line of defense — rsync, BorgBackup, scheduling, verification, and disaster recovery.
SELinux & AppArmor Guide
by Miles Everhart
Mandatory access controls — SELinux policies, AppArmor profiles, and MAC security hardening.
About This Reading List
This curated reading list contains 7 carefully selected books at the advanced level with an estimated reading time of 70 hours . Follow the recommended order for the best learning experience.