Cargando…

How to Cheat at Configuring Open Source Security Tools /

The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products l...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Gregg, Michael (Autor), Seagren, Eric (Autor), Orebaugh, Angela (Autor), Jonkman, Matt (Autor), Marty, Raffael (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Syngress, 2011.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1224593256
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 201201s2011 xx eo 000 0 eng d
040 |a TOH  |b eng  |c TOH  |d OCLCF  |d OCLCQ  |d OCLCO 
019 |a 823830282  |a 823899977  |a 824091266  |a 824139298 
020 |a 9780080553566 
020 |a 0080553567 
020 |a 1281060275 
020 |a 9781281060273 
024 8 |a B9781597491709X50139 
024 8 |a 9780080553566 
029 1 |a AU@  |b 000067300357 
035 |a (OCoLC)1224593256  |z (OCoLC)823830282  |z (OCoLC)823899977  |z (OCoLC)824091266  |z (OCoLC)824139298 
050 4 |a PN 
082 0 4 |a 005.8  |q OCoLC  |2 22/eng/20230216 
049 |a UAMI 
100 1 |a Gregg, Michael,  |e author. 
245 1 0 |a How to Cheat at Configuring Open Source Security Tools /  |c Gregg, Michael. 
250 |a 1st edition. 
264 1 |a [Place of publication not identified] :  |b Syngress,  |c 2011. 
300 |a 1 online resource (528 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 51.95 
520 |a The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't. 
542 |f Copyright and#169: Elsevier Science and Technology  |g 2007 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title page (viewed April 18, 2011). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Software configuration management. 
650 0 |a Open source software. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Logiciels  |x Gestion de configurations. 
650 6 |a Logiciels libres. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Open source software  |2 fast 
650 7 |a Software configuration management  |2 fast 
700 1 |a Seagren, Eric,  |e author. 
700 1 |a Orebaugh, Angela,  |e author. 
700 1 |a Jonkman, Matt,  |e author. 
700 1 |a Marty, Raffael,  |e author. 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
776 0 8 |i Print version:  |t How to cheat at configuring Open Source security tools.  |d Rockland, Mass. : Syngress ; [Oxford] : [Elsevier Science, distributor], 2007  |z 9781597491709  |w (DLC) 2007298839  |w (OCoLC)85830001 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780080553566/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 106027 
994 |a 92  |b IZTAP