Cargando…

How to cheat at configuring Open Source security tools /

The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Alder, Raven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress, �2007.
�2007
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn298357778
003 OCoLC
005 20231117014907.0
006 m o d
007 cr zn|||||||||
008 090114s2007 maua o 001 0 eng d
040 |a NTG  |b eng  |e pn  |c NTG  |d N$T  |d YDXCP  |d MERUC  |d ZCU  |d OCLCQ  |d E7B  |d OCLCQ  |d IDEBK  |d OCLCQ  |d B24X7  |d OCLCQ  |d OCLCF  |d OPELS  |d DKDLA  |d OCLCQ  |d UMI  |d COO  |d OCLCQ  |d DEBBG  |d AGLDB  |d Z5A  |d LIV  |d OCLCQ  |d D6H  |d UAB  |d OCLCQ  |d VTS  |d CEF  |d OCLCQ  |d WYU  |d JBG  |d STF  |d LEAUB  |d M8D  |d VT2  |d OCLCQ  |d OCLCO  |d MHW  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA719100  |2 bnb 
016 7 |a 013689636  |2 Uk 
019 |a 162131596  |a 182732374  |a 183273967  |a 441814426  |a 488132147  |a 507230067  |a 647685083  |a 931874209  |a 1066582000  |a 1153033285  |a 1192345610  |a 1240536990 
020 |a 9780080553566  |q (electronic bk.) 
020 |a 0080553567  |q (electronic bk.) 
020 |z 9781597491709 
020 |z 1597491705  |q (pbk.) 
035 |a (OCoLC)298357778  |z (OCoLC)162131596  |z (OCoLC)182732374  |z (OCoLC)183273967  |z (OCoLC)441814426  |z (OCoLC)488132147  |z (OCoLC)507230067  |z (OCoLC)647685083  |z (OCoLC)931874209  |z (OCoLC)1066582000  |z (OCoLC)1153033285  |z (OCoLC)1192345610  |z (OCoLC)1240536990 
050 4 |a TK5105.59  |b .H68 2007eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
245 0 0 |a How to cheat at configuring Open Source security tools /  |c Raven Alder [and others]. 
260 |a Rockland, Mass. :  |b Syngress,  |c �2007. 
264 4 |c �2007 
300 |a 1 online resource (xvi, 512 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover -- Contents -- Chapter 1. Testing and Auditing Your Systems -- Introduction -- Taking Inventory -- Vulnerability Scanning -- OSSTMM -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Protecting Your Perimeter -- Introduction -- Firewall Types -- Firewall Architectures -- Implementing Firewalls -- Providing Secure Remote Access -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Protecting Network Resources -- Introduction -- Performing Basic Hardening -- Hardening Windows Systems -- Hardening Linux Systems -- Hardening Infrastructure Devices -- Patching Systems -- Personal Firewalls -- Providing Antivirus and Antispyware Protection -- Encrypting Sensitive Data -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Introducing Snort -- Introduction -- How an IDS Works -- Where Snort Fits -- Snort System Requirements -- Exploring Snort's Features -- Using Snort on Your Network -- Security Considerations with Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. Installing Snort 2.6 -- Introduction -- Choosing the Right OS -- Hardware Platform Considerations -- Installing Snort -- Configuring Snort -- Testing Snort -- Maintaining Snort -- Updating Snort -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Configuring Snort and Add-Ons -- Placing Your NIDS -- Configuring Snort on a Windows System -- Configuring Snort on a Linux System -- Demonstrating Effectiveness -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Introducing Wireshark: Network Protocol Analyzer -- Introduction -- What is Wireshark? -- Supporting Programs -- Using Wireshark in Your Network Architecture -- Using Wireshark for Network Troubleshooting -- Using Wireshark for System Administration -- Securing Ethereal -- Optimizing Wireshark -- Advanced Sniffing Techniques -- Securing Your Network from Sniffers -- Employing Detection Techniques -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Getting and Installing Wireshark -- Introduction -- Getting Wireshark -- Packet Capture Drivers -- Installing Wireshark on Windows -- Installing Wireshark on Linux -- Installing Wireshark on Mac OSX -- Installing Wireshark from Source -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Using Wireshark -- Introduction -- Getting Started with Wireshark -- Exploring the Main Window -- Other Window Components -- Exploring the Menus -- View -- Go -- Capture -- Analyze -- Statistics -- Help -- Pop-up Menus -- Using Command-line Options -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Network Reporting and Troubleshooting with other Tools -- Introduction -- Reporting on Bandwidth Usage and Other Metrics -- Collecting Data for Analysis -- Understanding SNMP -- Troubleshooting Network Problems from the Command Line. 
520 |a The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks! 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Open source software. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a Logiciels libres.  |0 (CaQQLa)201-0330646 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Open source software  |2 fast  |0 (OCoLC)fst01046097 
700 1 |a Alder, Raven. 
776 0 8 |i Print version:  |t How to cheat at configuring Open source security tools.  |d Burlington, MA : Syngress Pub., �2007  |z 1597491705  |z 9781597491709  |w (DLC) 2007298839  |w (OCoLC)85830001 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597491709  |z Texto completo