Cargando…

How to cheat at configuring Open Source security tools /

The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Alder, Raven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress, ©2007.
©2007
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocn298357778
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 090114s2007 maua o 001 0 eng d
040 |a NTG  |b eng  |e pn  |c NTG  |d N$T  |d YDXCP  |d MERUC  |d ZCU  |d OCLCQ  |d E7B  |d OCLCQ  |d IDEBK  |d OCLCQ  |d B24X7  |d OCLCQ  |d OCLCF  |d OPELS  |d DKDLA  |d OCLCQ  |d UMI  |d COO  |d OCLCQ  |d DEBBG  |d AGLDB  |d Z5A  |d LIV  |d OCLCQ  |d D6H  |d UAB  |d OCLCQ  |d VTS  |d CEF  |d OCLCQ  |d WYU  |d JBG  |d STF  |d LEAUB  |d M8D  |d VT2  |d OCLCQ  |d OCLCO  |d MHW  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA719100  |2 bnb 
016 7 |a 013689636  |2 Uk 
019 |a 162131596  |a 182732374  |a 183273967  |a 441814426  |a 488132147  |a 507230067  |a 647685083  |a 931874209  |a 1066582000  |a 1153033285  |a 1192345610  |a 1240536990 
020 |a 9780080553566  |q (electronic bk.) 
020 |a 0080553567  |q (electronic bk.) 
020 |z 9781597491709 
020 |z 1597491705  |q (pbk.) 
029 1 |a AU@  |b 000051557349 
029 1 |a AU@  |b 000051860173 
029 1 |a AU@  |b 000053252017 
029 1 |a AU@  |b 000054166964 
029 1 |a CHNEW  |b 001007839 
029 1 |a DEBBG  |b BV039828870 
029 1 |a DEBBG  |b BV042314186 
029 1 |a DEBBG  |b BV043076658 
029 1 |a DEBBG  |b BV043968311 
029 1 |a DEBSZ  |b 275238369 
029 1 |a DEBSZ  |b 422164283 
029 1 |a DEBSZ  |b 485788039 
029 1 |a GBVCP  |b 802749933 
029 1 |a GBVCP  |b 882748734 
029 1 |a NZ1  |b 11778386 
029 1 |a NZ1  |b 16033541 
035 |a (OCoLC)298357778  |z (OCoLC)162131596  |z (OCoLC)182732374  |z (OCoLC)183273967  |z (OCoLC)441814426  |z (OCoLC)488132147  |z (OCoLC)507230067  |z (OCoLC)647685083  |z (OCoLC)931874209  |z (OCoLC)1066582000  |z (OCoLC)1153033285  |z (OCoLC)1192345610  |z (OCoLC)1240536990 
037 |a 140937:141079  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .H68 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a How to cheat at configuring Open Source security tools /  |c Raven Alder [and others]. 
260 |a Rockland, Mass. :  |b Syngress,  |c ©2007. 
264 4 |c ©2007 
300 |a 1 online resource (xvi, 512 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line. 
520 |a The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks! 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Open source software. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Logiciels libres. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Open source software  |2 fast 
700 1 |a Alder, Raven. 
776 0 8 |i Print version:  |t How to cheat at configuring Open source security tools.  |d Burlington, MA : Syngress Pub., ©2007  |z 1597491705  |z 9781597491709  |w (DLC) 2007298839  |w (OCoLC)85830001 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211411  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00025455 
938 |a EBSCOhost  |b EBSC  |n 211411 
938 |a YBP Library Services  |b YANK  |n 2737758 
994 |a 92  |b IZTAP