Cargando…

Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG /

This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Seagren, Eric
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], 2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn162597614
003 OCoLC
005 20231117015031.0
006 m o d
007 cr cn|||||||||
008 070806s2006 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d OCLCF  |d OCLCO  |d DKDLA  |d OCLCO  |d OCLCQ  |d Z5A  |d OCLCQ  |d D6H  |d CEF  |d LEAUB  |d STF  |d OL$  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 474428633 
020 |a 9781597491235  |q (paperback) 
020 |a 1597491233  |q (paperback) 
035 |a (OCoLC)162597614  |z (OCoLC)474428633 
050 4 |a TK5105.59  |b .S432 2006eb 
082 0 4 |a 005.8  |2 22 
100 1 |a Seagren, Eric. 
245 1 0 |a Secure your network for free :  |b using NMAP, wireshark, snort, nessus, and MRTG /  |c Eric Seagren. 
260 |a Rockland, Mass. :  |b Syngress ;  |a Oxford :  |b Elsevier Science [distributor],  |c 2006. 
300 |a 1 online resource (xiv, 493 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software. * Teachers you how to implement best of breed security using tools for free * Ideal for anyone recomending and implementing new technologies within the company * Companion Web site contains dozens of working scripts and tools. 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 0 |t Secure Your Network for Free --  |t Copyright Page --  |g 1.  |t Presenting the Business Case for Free Solutions --  |t Introduction --  |t The Costs of Using Free Security Solutions --  |t The Savings of Using Free Security Solutions --  |t Comparing Free Solutions with Commercial Solutions --  |t "Selling" a Free Solution --  |t Summary --  |t Solutions Fast Track --  |t Frequently Asked Questions --  |g 2.  |t Protecting Your Perimeter --  |t Introduction --  |t Firewall Types --  |t Firewall Architectures --  |t Implementing Firewalls --  |t Providing Secure Remote Access --  |t Summary --  |t Solutions Fast Track --  |t Frequently Asked Questions. 
505 0 0 |g 3.  |t Protecting Network ResourcesIntroduction --  |t Performing Basic Hardening --  |t Hardening Windows Systems --  |t Hardening Linux Systems --  |t Hardening Infrastructure Devices --  |t Patching Systems --  |t Personal Firewalls --  |t Providing Antivirus and Antispyware Protection --  |t Encrypting Sensitive Data --  |t Summary --  |t Solutions Fast Track --  |t Frequently Asked Questions --  |g 4.  |t Configuring an Intrusion Detection System --  |t Introduction --  |t Intrusion Detection Systems --  |t Configuring an Intrusion Detection System --  |t Configuring Snort on a Windows System --  |t Configuring Snort on a Linux System --  |t Other Snort Add-Ons. 
505 0 0 |t Demonstrating EffectivenessSummary --  |t Solutions Fast Track --  |t Frequently Asked Questions --  |g 5.  |t Managing Event Logs --  |t Introduction --  |t Generating Windows Event Logs --  |t Generating Syslog Event Logs --  |t Securing Your Event Logs --  |t Applying Your Knowledge --  |t Summary --  |t Solutions Fast Track --  |t Frequently Asked Questions --  |g 6.  |t Testing and Auditing Your Systems --  |t Introduction --  |t Taking Inventory --  |t Vulnerability Scanning --  |t OSSTMM --  |t Summary --  |t Solutions Fast Track --  |t Frequently Asked Questions --  |g 7.  |t Network Reporting and Troubleshooting --  |t Introduction --  |t Reporting on Bandwidth Usage and Other Metrics. 
505 0 0 |t Collecting Data for AnalysisUnderstanding SNMP --  |t Troubleshooting Network Problems --  |t Additional Troubleshooting Tools --  |t Summary --  |t Solutions Fast Track --  |t Frequently Asked Questions --  |g 8.  |t Security as an Ongoing Process --  |t Introduction --  |t Patch Management --  |t Change Management --  |t Antivirus --  |t Antispyware --  |t Intrusion Detection Systems --  |t Vulnerability Scanning --  |t Penetration Testing --  |t Policy Review --  |t Physical Security --  |t CERT Team --  |t Summary --  |t Solutions Fast Track --  |t Frequently Asked Questions. 
650 0 |a Computer networks  |x Security measures  |v Software. 
650 6 |a R�eseaux d'ordinateurs  |0 (CaQQLa)201-0263812  |x S�ecurit�e  |0 (CaQQLa)201-0263812  |x Mesures  |0 (CaQQLa)201-0263812  |v Logiciels.  |0 (CaQQLa)201-0378275 
650 7 |a Computer networks  |x Security measures  |x Software.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
655 7 |a Software  |2 fast  |0 (OCoLC)fst01411640 
776 0 8 |i Print version:  |a Seagren, Eric.  |t Secure your network for free.  |d Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2006  |z 9781597491235  |z 1597491233  |w (OCoLC)77541326 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597491235  |z Texto completo