How to cheat at configuring Open Source security tools /:
The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. :
Syngress,
©2007.
©2007 |
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks! |
Beschreibung: | 1 online resource (xvi, 512 pages) : illustrations |
ISBN: | 9780080553566 0080553567 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn298357778 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 090114s2007 maua o 001 0 eng d | ||
040 | |a NTG |b eng |e pn |c NTG |d N$T |d YDXCP |d MERUC |d ZCU |d OCLCQ |d E7B |d OCLCQ |d IDEBK |d OCLCQ |d B24X7 |d OCLCQ |d OCLCF |d OPELS |d DKDLA |d OCLCQ |d UMI |d COO |d OCLCQ |d DEBBG |d AGLDB |d Z5A |d LIV |d OCLCQ |d D6H |d UAB |d OCLCQ |d VTS |d CEF |d OCLCQ |d WYU |d JBG |d STF |d LEAUB |d M8D |d VT2 |d OCLCQ |d OCLCO |d MHW |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
015 | |a GBA719100 |2 bnb | ||
016 | 7 | |a 013689636 |2 Uk | |
019 | |a 162131596 |a 182732374 |a 183273967 |a 441814426 |a 488132147 |a 507230067 |a 647685083 |a 931874209 |a 1066582000 |a 1153033285 |a 1192345610 |a 1240536990 | ||
020 | |a 9780080553566 |q (electronic bk.) | ||
020 | |a 0080553567 |q (electronic bk.) | ||
020 | |z 9781597491709 | ||
020 | |z 1597491705 |q (pbk.) | ||
035 | |a (OCoLC)298357778 |z (OCoLC)162131596 |z (OCoLC)182732374 |z (OCoLC)183273967 |z (OCoLC)441814426 |z (OCoLC)488132147 |z (OCoLC)507230067 |z (OCoLC)647685083 |z (OCoLC)931874209 |z (OCoLC)1066582000 |z (OCoLC)1153033285 |z (OCoLC)1192345610 |z (OCoLC)1240536990 | ||
037 | |a 140937:141079 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .H68 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a How to cheat at configuring Open Source security tools / |c Raven Alder [and others]. |
260 | |a Rockland, Mass. : |b Syngress, |c ©2007. | ||
264 | 4 | |c ©2007 | |
300 | |a 1 online resource (xvi, 512 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line. | |
520 | |a The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks! | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Open source software. |0 http://id.loc.gov/authorities/subjects/sh99003437 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels libres. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Open source software |2 fast | |
700 | 1 | |a Alder, Raven. |1 https://id.oclc.org/worldcat/entity/E39PCjDHBkVDXdwg9Q8JFdkxDq |0 http://id.loc.gov/authorities/names/no2004075481 | |
758 | |i has work: |a How to cheat at configuring Open Source security tools (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGjVXRWcRdbHXcHV6x9j3P |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t How to cheat at configuring Open source security tools. |d Burlington, MA : Syngress Pub., ©2007 |z 1597491705 |z 9781597491709 |w (DLC) 2007298839 |w (OCoLC)85830001 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597491709 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211411 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00025455 | ||
938 | |a EBSCOhost |b EBSC |n 211411 | ||
938 | |a YBP Library Services |b YANK |n 2737758 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn298357778 |
---|---|
_version_ | 1816881684295974912 |
adam_text | |
any_adam_object | |
author2 | Alder, Raven |
author2_role | |
author2_variant | r a ra |
author_GND | http://id.loc.gov/authorities/names/no2004075481 |
author_facet | Alder, Raven |
author_sort | Alder, Raven |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .H68 2007eb |
callnumber-search | TK5105.59 .H68 2007eb |
callnumber-sort | TK 45105.59 H68 42007EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line. |
ctrlnum | (OCoLC)298357778 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06346cam a2200613 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn298357778</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">090114s2007 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NTG</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">NTG</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OPELS</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">Z5A</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">JBG</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA719100</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">013689636</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162131596</subfield><subfield code="a">182732374</subfield><subfield code="a">183273967</subfield><subfield code="a">441814426</subfield><subfield code="a">488132147</subfield><subfield code="a">507230067</subfield><subfield code="a">647685083</subfield><subfield code="a">931874209</subfield><subfield code="a">1066582000</subfield><subfield code="a">1153033285</subfield><subfield code="a">1192345610</subfield><subfield code="a">1240536990</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553566</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553567</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597491709</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597491705</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)298357778</subfield><subfield code="z">(OCoLC)162131596</subfield><subfield code="z">(OCoLC)182732374</subfield><subfield code="z">(OCoLC)183273967</subfield><subfield code="z">(OCoLC)441814426</subfield><subfield code="z">(OCoLC)488132147</subfield><subfield code="z">(OCoLC)507230067</subfield><subfield code="z">(OCoLC)647685083</subfield><subfield code="z">(OCoLC)931874209</subfield><subfield code="z">(OCoLC)1066582000</subfield><subfield code="z">(OCoLC)1153033285</subfield><subfield code="z">(OCoLC)1192345610</subfield><subfield code="z">(OCoLC)1240536990</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">140937:141079</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.H68 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">How to cheat at configuring Open Source security tools /</subfield><subfield code="c">Raven Alder [and others].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 512 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh99003437</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels libres.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alder, Raven.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjDHBkVDXdwg9Q8JFdkxDq</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004075481</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">How to cheat at configuring Open Source security tools (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGjVXRWcRdbHXcHV6x9j3P</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">How to cheat at configuring Open source security tools.</subfield><subfield code="d">Burlington, MA : Syngress Pub., ©2007</subfield><subfield code="z">1597491705</subfield><subfield code="z">9781597491709</subfield><subfield code="w">(DLC) 2007298839</subfield><subfield code="w">(OCoLC)85830001</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597491709</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211411</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00025455</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">211411</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2737758</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn298357778 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:37Z |
institution | BVB |
isbn | 9780080553566 0080553567 |
language | English |
oclc_num | 298357778 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 512 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress, |
record_format | marc |
spelling | How to cheat at configuring Open Source security tools / Raven Alder [and others]. Rockland, Mass. : Syngress, ©2007. ©2007 1 online resource (xvi, 512 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line. The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks! Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Réseaux d'ordinateurs Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Open source software fast Alder, Raven. https://id.oclc.org/worldcat/entity/E39PCjDHBkVDXdwg9Q8JFdkxDq http://id.loc.gov/authorities/names/no2004075481 has work: How to cheat at configuring Open Source security tools (Text) https://id.oclc.org/worldcat/entity/E39PCGjVXRWcRdbHXcHV6x9j3P https://id.oclc.org/worldcat/ontology/hasWork Print version: How to cheat at configuring Open source security tools. Burlington, MA : Syngress Pub., ©2007 1597491705 9781597491709 (DLC) 2007298839 (OCoLC)85830001 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597491709 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211411 Volltext |
spellingShingle | How to cheat at configuring Open Source security tools / Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Réseaux d'ordinateurs Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Open source software fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh99003437 |
title | How to cheat at configuring Open Source security tools / |
title_auth | How to cheat at configuring Open Source security tools / |
title_exact_search | How to cheat at configuring Open Source security tools / |
title_full | How to cheat at configuring Open Source security tools / Raven Alder [and others]. |
title_fullStr | How to cheat at configuring Open Source security tools / Raven Alder [and others]. |
title_full_unstemmed | How to cheat at configuring Open Source security tools / Raven Alder [and others]. |
title_short | How to cheat at configuring Open Source security tools / |
title_sort | how to cheat at configuring open source security tools |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Réseaux d'ordinateurs Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Open source software fast |
topic_facet | Computer networks Security measures. Open source software. Réseaux d'ordinateurs Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Open source software |
url | https://www.sciencedirect.com/science/book/9781597491709 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211411 |
work_keys_str_mv | AT alderraven howtocheatatconfiguringopensourcesecuritytools |