
Open Source Security Tools
A Practical Guide to Security Applications
Tony Howlett - Collection Bruce Perens' Open Source Series
Résumé
Sorts through the mass of open source security tools, chooses a few of the best, and shows network and system admins how to use them.
- Reviews for sys admins and newcomers alike the best open source tools - including those that secure not only Unix and Linux but WINDOWS.
- Includes a BONUS CD of full versions tools in one place - no need to go searching to download!
- Tony Howlett is the president of "Network Security Services," a computer security Application Service Provider built entirely on open source software.
This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows network and system administrators how to use them to solve common security problem. Open Source Security Tools is a practicum. It tells readers what they need to do to secure their networks, introduces best-in-class tools, and shows readers how to use them. For each security task described, Howlett reviews the best open source tools, shows readers how to use them, and takes them through a sample implementation and case studies. At the end of each chapter, Howlett will offer pointers to other good open source tools that are worth investigating. The companion CD includes fully dowloadable versions of the tools, so readers can work along with the text. Newcomers to security will leave with enough knowledge and experience to deploy solutions and further their IT careers. Readers will learn to: * Secure their perimeter with open source scanners like Nessus. * Receive early warning about attempted breakins from IDS systems like Snort. * Install a firewall to keep hackers at bay (Turtle). * Use encryption to secure email and other sensitive data (PGP) * If the worst happens, run forensics tools to investigate a breakin after the fact, like Autopsy or SleuthKit. This book is part of the Bruce Perens Open Source Series.
L'auteur - Tony Howlett
Tony Howlett is the president of Network Security Services, a computer-security application service provider built entirely on open source software. A Certified Information Systems Security Professional (CISSP) and GIAC Systems and Network Auditor (GNSA), he has fourteen years of experience, including running a major regional ISP/CLEC and building a nationwide ATM/DSL network. Mr. Howlett is a frequent speaker on computer security and technology topics and has written for SysAdmin, Computer Currents, Windows Web Solutions, Security Administrator, and other magazines.
Sommaire
- Information Security and Open Source Software.
- The Practice of Information Security.
- The State of Computer Crime.
- Info-Security Business Risks.
- Open Source History.
- Open Source Advantages.
- When Open Source May Not Fit Your Needs.
- Windows and Open Source.
- Open Source Licenses.
- Operating System Tools.
- Hardening Your Security Tool System.
- traceroute (UNIX) or tracert (Windows): Network Diagnostic Tools.
- Considerations for Hardening Windows.
- Firewalls.
- Network Architecture Basics.
- TCP/IP Networking.
- Security Business Processes.
- SmoothWall Hardware Requirements.
- SmoothWall Express Versus SmoothWall Corporate.
- Installing SmoothWall.
- Administering the SmoothWall Firewall.
- Creating a VPN on the SmoothWall Firewall.
- Windows-Based Firewalls.
- Port Scanners.
- Overview of Port Scanners.
- Considerations for Port Scanning.
- Uses for Port Scanners.
- Vulnerability Scanners.
- Identifying Security Holes in Your Systems.
- Vulnerability Scanners to the Rescue.
- Considerations for Vulnerability Scanning.
- What Vulnerability Testing Doesn't Find.
- Network Sniffers.
- A Brief History of Ethernet.
- Considerations for Network Sniffing.
- TCP/IP Packet Headers.
- Intrusion Detection Systems.
- NIDS Signature Examples.
- The Problem of NIDS False Positives.
- Getting the Most Out of Your IDS.
- Configuring Snort for Maximum Performance.
- Host-Based Intrusion Detection.
- Analysis and Management Tools.
- Using Databases and Web Servers to Manage Your Security Data.
- The Birth of an Open Source Project.
- Encryption Tools.
- Types of Encryption.
- Virtual Private Networks.
- Wireless Tools.
- Wireless LAN Technology.
- Dangers of Wireless LANs.
- The "War-Driving" Phenomenon.
- Performing a Wireless Network Security Assessment.
- Steps for More Secure Wireless LANs.
- Forensic Tools.
- Uses for Computer Forensic Tools.
- Building an Incident Response Plan.
- Preparing for Good Forensic Data.
- Where to Look for Forensic Data.
- Tenets of Good Forensic Analysis.
- Forensic Analysis Tools.
- Reviewing Log Files.
- Making Copies of Forensic Evidence.
- More on Open Source Software.
- Open Source Resources.
- Joining the Open Source Movement.
- More Open Source Security Tools.
- Appendix A Open Source Licenses.
- Appendix B Basic Linux/UNIX Commands.
- Appendix C Well-Known TCP/IP Port Numbers.
- Appendix D General Permission and Waiver Form.
- Appendix E.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Prentice Hall |
Auteur(s) | Tony Howlett |
Collection | Bruce Perens' Open Source Series |
Parution | 15/09/2004 |
Nb. de pages | 578 |
Couverture | Broché |
Poids | 1165g |
Intérieur | Noir et Blanc |
EAN13 | 9780321194435 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Conception et architectures réseau
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Protocoles et standards PKI
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet