Cargando…

Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG /

This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Seagren, Eric
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2006.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Secure Your Network for Free
  • Copyright Page
  • 1. Presenting the Business Case for Free Solutions
  • Introduction
  • The Costs of Using Free Security Solutions
  • The Savings of Using Free Security Solutions
  • Comparing Free Solutions with Commercial Solutions
  • "Selling" a Free Solution
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • 2. Protecting Your Perimeter
  • Introduction
  • Firewall Types
  • Firewall Architectures
  • Implementing Firewalls
  • Providing Secure Remote Access
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions.
  • 3. Protecting Network ResourcesIntroduction
  • Performing Basic Hardening
  • Hardening Windows Systems
  • Hardening Linux Systems
  • Hardening Infrastructure Devices
  • Patching Systems
  • Personal Firewalls
  • Providing Antivirus and Antispyware Protection
  • Encrypting Sensitive Data
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • 4. Configuring an Intrusion Detection System
  • Introduction
  • Intrusion Detection Systems
  • Configuring an Intrusion Detection System
  • Configuring Snort on a Windows System
  • Configuring Snort on a Linux System
  • Other Snort Add-Ons.
  • Demonstrating EffectivenessSummary
  • Solutions Fast Track
  • Frequently Asked Questions
  • 5. Managing Event Logs
  • Introduction
  • Generating Windows Event Logs
  • Generating Syslog Event Logs
  • Securing Your Event Logs
  • Applying Your Knowledge
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • 6. Testing and Auditing Your Systems
  • Introduction
  • Taking Inventory
  • Vulnerability Scanning
  • OSSTMM
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • 7. Network Reporting and Troubleshooting
  • Introduction
  • Reporting on Bandwidth Usage and Other Metrics.
  • Collecting Data for AnalysisUnderstanding SNMP
  • Troubleshooting Network Problems
  • Additional Troubleshooting Tools
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • 8. Security as an Ongoing Process
  • Introduction
  • Patch Management
  • Change Management
  • Antivirus
  • Antispyware
  • Intrusion Detection Systems
  • Vulnerability Scanning
  • Penetration Testing
  • Policy Review
  • Physical Security
  • CERT Team
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions.