Stephen Dominguez's Power Security Blog for AIX & Linux
From his book, “Network Security Assessment”, Chris McNab indicates the most common hacking methods: