Coverart for item
The Resource How to cheat at configuring Open Source security tools, Raven Alder [and others], (electronic resource)

How to cheat at configuring Open Source security tools, Raven Alder [and others], (electronic resource)

Label
How to cheat at configuring Open Source security tools
Title
How to cheat at configuring Open Source security tools
Statement of responsibility
Raven Alder [and others]
Contributor
Subject
Language
eng
Summary
The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!
Dewey number
005.8
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
Alder, Raven
http://library.link/vocab/subjectName
  • Computer networks
  • Open source software
Label
How to cheat at configuring Open Source security tools, Raven Alder [and others], (electronic resource)
Instantiates
Publication
Note
  • Title from title screen (viewed Jan. 14, 2009)
  • Includes index
Color
other
Contents
Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line
Control code
ocn298357778
Dimensions
unknown
Extent
1 online resource (xvi, 512 pages)
Form of item
online
Isbn
9780080553566
Note
eBooks on EBSCOhost
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)298357778
Label
How to cheat at configuring Open Source security tools, Raven Alder [and others], (electronic resource)
Publication
Note
  • Title from title screen (viewed Jan. 14, 2009)
  • Includes index
Color
other
Contents
Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line
Control code
ocn298357778
Dimensions
unknown
Extent
1 online resource (xvi, 512 pages)
Form of item
online
Isbn
9780080553566
Note
eBooks on EBSCOhost
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)298357778

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...