Cargando…

How to cheat at configuring Open Source security tools /

The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Alder, Raven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Syngress, �2007.
�2007
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Contents
  • Chapter 1. Testing and Auditing Your Systems
  • Introduction
  • Taking Inventory
  • Vulnerability Scanning
  • OSSTMM
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 2. Protecting Your Perimeter
  • Introduction
  • Firewall Types
  • Firewall Architectures
  • Implementing Firewalls
  • Providing Secure Remote Access
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 3. Protecting Network Resources
  • Introduction
  • Performing Basic Hardening
  • Hardening Windows Systems
  • Hardening Linux Systems
  • Hardening Infrastructure Devices
  • Patching Systems
  • Personal Firewalls
  • Providing Antivirus and Antispyware Protection
  • Encrypting Sensitive Data
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 4. Introducing Snort
  • Introduction
  • How an IDS Works
  • Where Snort Fits
  • Snort System Requirements
  • Exploring Snort's Features
  • Using Snort on Your Network
  • Security Considerations with Snort
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 5. Installing Snort 2.6
  • Introduction
  • Choosing the Right OS
  • Hardware Platform Considerations
  • Installing Snort
  • Configuring Snort
  • Testing Snort
  • Maintaining Snort
  • Updating Snort
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 6. Configuring Snort and Add-Ons
  • Placing Your NIDS
  • Configuring Snort on a Windows System
  • Configuring Snort on a Linux System
  • Demonstrating Effectiveness
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 7. Introducing Wireshark: Network Protocol Analyzer
  • Introduction
  • What is Wireshark?
  • Supporting Programs
  • Using Wireshark in Your Network Architecture
  • Using Wireshark for Network Troubleshooting
  • Using Wireshark for System Administration
  • Securing Ethereal
  • Optimizing Wireshark
  • Advanced Sniffing Techniques
  • Securing Your Network from Sniffers
  • Employing Detection Techniques
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 8. Getting and Installing Wireshark
  • Introduction
  • Getting Wireshark
  • Packet Capture Drivers
  • Installing Wireshark on Windows
  • Installing Wireshark on Linux
  • Installing Wireshark on Mac OSX
  • Installing Wireshark from Source
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 9. Using Wireshark
  • Introduction
  • Getting Started with Wireshark
  • Exploring the Main Window
  • Other Window Components
  • Exploring the Menus
  • View
  • Go
  • Capture
  • Analyze
  • Statistics
  • Help
  • Pop-up Menus
  • Using Command-line Options
  • Summary
  • Solutions Fast Track
  • Frequently Asked Questions
  • Chapter 10. Network Reporting and Troubleshooting with other Tools
  • Introduction
  • Reporting on Bandwidth Usage and Other Metrics
  • Collecting Data for Analysis
  • Understanding SNMP
  • Troubleshooting Network Problems from the Command Line.