Open Source Security Tools : Practical Guide to Security Applications
Tony Howlett
- 出版商: Prentice Hall
- 出版日期: 2004-07-29
- 售價: $2,010
- 貴賓價: 9.5 折 $1,910
- 語言: 英文
- 頁數: 608
- 裝訂: Paperback
- ISBN: 0321194438
- ISBN-13: 9780321194435
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$520$406 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$980Introduction to Communication Systems, 3/e
-
$780$741 -
$590$466 -
$680$537 -
$560$504 -
$780$663 -
$2,340$2,223 -
$480$379 -
$780$616 -
$490$382 -
$780$663 -
$490$382 -
$690$587 -
$890$703 -
$620$490 -
$540$427 -
$780$616 -
$580$452 -
$480$408 -
$1,580$1,501 -
$460$363 -
$675LPIC 1 Exam Cram 2: Linux Professional Institute Certification Exams 101 and 102 (Paperback)
-
$750$585
相關主題
商品描述
Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, chances are their jobs depend on how well their network defenses hold.
Written with the harried IT manager in mind, Open-Source Security Tools is a practical, hands-on introduction to open-source security tools. Seasoned security expert Tony Howlett has reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the "best of breed" for all major areas of information security.
Inside, you'll find everything from how to harden Linux and Windows systems to how to investigate breaches with Sleuth Kit, Autopsy Forensic Browser, and Forensic Tool Kit. For each security task described, the author reviews the best open-source tools and how to use them and also provides a case study and sample implementation. Covered tasks include:
- Installing an open-source firewall using Ipchains, Iptables, or T/REX
- Scanning ports and testing vulnerability using Nmap, Nlog, Nmap for Windows, Nessus, or NessusWX
- Using sniffers and network-intrusion systems, including Tcpdump, Ethereal, Windump, Snort—, and Snort— for Windows
- Tracking and analyzing collected data with Swatch, ACID, and NCC
- Encrypting communications with PGP, GPG, SSH, S/WAN, and John the Ripper
This handy reference also tackles the emerging field of wireless security and tools such as Kismet Wireless, Airsnort, and Netstumber. An accompanying CD-ROM contains full versions of all of the tools for easy access and installation as well as RFCs and other useful information.
Whether you're a Windows system administrator or a network administrator, you will come away with an understanding of how open-source security tools can help protect your organization and further your own career.
Table of Contents:
Preface.
1. Information Security and Open Source Software.
2. Operating System Tools.
3. Firewalls.
4. Port Scanners.
5. Vulnerability Scanners.
6. Network Sniffers.
7. Intrusion Detection Systems.
8. Analysis and Management Tools.
9. Encryption Tools.
10. Wireless Tools.
11. Forensic Tools.
12. More Open Source Security.
Appendix A: Common Open Source Licenses.
Appendix B: Basic Linux/Unix Commands.
Appendix C: Well-Known TCP/IP Port Numbers.
Appendix D: Port Scanning and Vulnerability Testing: General Permissions and Waiver.
Appendix E: Nassus Plugins.
Index.