How to cheat at configuring Open Source security tools /
The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress,
�2007.
�2007 |
Temas: | |
Acceso en línea: | Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | SCIDIR_ocn298357778 | ||
003 | OCoLC | ||
005 | 20231117014907.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 090114s2007 maua o 001 0 eng d | ||
040 | |a NTG |b eng |e pn |c NTG |d N$T |d YDXCP |d MERUC |d ZCU |d OCLCQ |d E7B |d OCLCQ |d IDEBK |d OCLCQ |d B24X7 |d OCLCQ |d OCLCF |d OPELS |d DKDLA |d OCLCQ |d UMI |d COO |d OCLCQ |d DEBBG |d AGLDB |d Z5A |d LIV |d OCLCQ |d D6H |d UAB |d OCLCQ |d VTS |d CEF |d OCLCQ |d WYU |d JBG |d STF |d LEAUB |d M8D |d VT2 |d OCLCQ |d OCLCO |d MHW |d OCLCO |d OCLCQ |d OCLCO | ||
015 | |a GBA719100 |2 bnb | ||
016 | 7 | |a 013689636 |2 Uk | |
019 | |a 162131596 |a 182732374 |a 183273967 |a 441814426 |a 488132147 |a 507230067 |a 647685083 |a 931874209 |a 1066582000 |a 1153033285 |a 1192345610 |a 1240536990 | ||
020 | |a 9780080553566 |q (electronic bk.) | ||
020 | |a 0080553567 |q (electronic bk.) | ||
020 | |z 9781597491709 | ||
020 | |z 1597491705 |q (pbk.) | ||
035 | |a (OCoLC)298357778 |z (OCoLC)162131596 |z (OCoLC)182732374 |z (OCoLC)183273967 |z (OCoLC)441814426 |z (OCoLC)488132147 |z (OCoLC)507230067 |z (OCoLC)647685083 |z (OCoLC)931874209 |z (OCoLC)1066582000 |z (OCoLC)1153033285 |z (OCoLC)1192345610 |z (OCoLC)1240536990 | ||
050 | 4 | |a TK5105.59 |b .H68 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
245 | 0 | 0 | |a How to cheat at configuring Open Source security tools / |c Raven Alder [and others]. |
260 | |a Rockland, Mass. : |b Syngress, |c �2007. | ||
264 | 4 | |c �2007 | |
300 | |a 1 online resource (xvi, 512 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line. | |
520 | |a The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks! | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Open source software. | |
650 | 6 | |a R�eseaux d'ordinateurs |x S�ecurit�e |x Mesures. |0 (CaQQLa)201-0263812 | |
650 | 6 | |a Logiciels libres. |0 (CaQQLa)201-0330646 | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Open source software |2 fast |0 (OCoLC)fst01046097 | |
700 | 1 | |a Alder, Raven. | |
776 | 0 | 8 | |i Print version: |t How to cheat at configuring Open source security tools. |d Burlington, MA : Syngress Pub., �2007 |z 1597491705 |z 9781597491709 |w (DLC) 2007298839 |w (OCoLC)85830001 |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/book/9781597491709 |z Texto completo |