How to cheat at configuring Open Source security tools:
Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Rockland, Mass. Syngress c2007
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Beschreibung:Title from title screen (viewed Jan. 14, 2009). - Includes index
Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network --
- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers --
- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line
The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!
Beschreibung:1 Online-Ressource (xvi, 512 p.)
ISBN:0080553567
9780080553566
9781597491709

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen