Master Open Source Security Tools: Expert Configuration Guide by Eric Seagren et al (2007)

$ 37.47

Item Height: 1.3 in Publication Year: 2007 Intended Audience: Scholarly & Professional Subject: Security / General, General, Security / Networking Item Length: 9.2 in Item Weight: 31.6 Oz Number of Pages: 528 Pages Type: Textbook Publisher: Elsevier Science & Technology Books Table Of Content: Presenting the Business Case for Free Solutions Protecting Your Perimeter Protecting Network Resources Deploying Snort Deploying Wireshark Deploying Nessus Securing your Wireless Network Using Penetration Testing Tools Reporting and Analysis ISBN-10: 1597491705 Series: How to Cheat Ser. Item Width: 7.5 in LC Classification Number: TK5105.59 Illustrated: Yes ISBN-13: 9781597491709 Publication Name: How to Cheat at Configuring Open Source Security Tools Synopsis: The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't, The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network., An ideal book and companion Web site for multitasked security professionals and IT managers reveals how to secure corporate networks using the ten most popular tools including Snort, Nessus, Wireshark, Nmap, and Kismet on Windows, Linux, or Mac OS X. brand: Elsevier Science & Technology Books Author: Eric Seagren, Matt Jonkman, Angela Orebaugh, Raffael Marty, Michael Gregg Subject Area: Computers Format: Perfect Language: English gtin13: 9781597491709

Description

  1. This book is a game-changer for setting up open-source security tools quickly and efficiently. Packed with expert tips and smart workarounds, it simplifies complex configurations so even beginners can secure their systems. The authors’ clear, step-by-step guidance saves hours of frustration. A must-have for anyone working with security tools!

    user24220267