Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Open Source Security Tools
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Open Source Security Tools

Open Source Security Tools

A Practical Guide to Security Applications

Tony Howlett - Collection Bruce Perens' Open Source Series

578 pages, parution le 15/09/2004

Résumé

Sorts through the mass of open source security tools, chooses a few of the best, and shows network and system admins how to use them.

  • Reviews for sys admins and newcomers alike the best open source tools - including those that secure not only Unix and Linux but WINDOWS.
  • Includes a BONUS CD of full versions tools in one place - no need to go searching to download!
  • Tony Howlett is the president of "Network Security Services," a computer security Application Service Provider built entirely on open source software.

This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows network and system administrators how to use them to solve common security problem. Open Source Security Tools is a practicum. It tells readers what they need to do to secure their networks, introduces best-in-class tools, and shows readers how to use them. For each security task described, Howlett reviews the best open source tools, shows readers how to use them, and takes them through a sample implementation and case studies. At the end of each chapter, Howlett will offer pointers to other good open source tools that are worth investigating. The companion CD includes fully dowloadable versions of the tools, so readers can work along with the text. Newcomers to security will leave with enough knowledge and experience to deploy solutions and further their IT careers. Readers will learn to: * Secure their perimeter with open source scanners like Nessus. * Receive early warning about attempted breakins from IDS systems like Snort. * Install a firewall to keep hackers at bay (Turtle). * Use encryption to secure email and other sensitive data (PGP) * If the worst happens, run forensics tools to investigate a breakin after the fact, like Autopsy or SleuthKit. This book is part of the Bruce Perens Open Source Series.

L'auteur - Tony Howlett

Tony Howlett is the president of Network Security Services, a computer-security application service provider built entirely on open source software. A Certified Information Systems Security Professional (CISSP) and GIAC Systems and Network Auditor (GNSA), he has fourteen years of experience, including running a major regional ISP/CLEC and building a nationwide ATM/DSL network. Mr. Howlett is a frequent speaker on computer security and technology topics and has written for SysAdmin, Computer Currents, Windows Web Solutions, Security Administrator, and other magazines.

Sommaire

  • Information Security and Open Source Software.
    • The Practice of Information Security.
    • The State of Computer Crime.
    • Info-Security Business Risks.
    • Open Source History.
    • Open Source Advantages.
    • When Open Source May Not Fit Your Needs.
    • Windows and Open Source.
    • Open Source Licenses.
  • Operating System Tools.
    • Hardening Your Security Tool System.
    • traceroute (UNIX) or tracert (Windows): Network Diagnostic Tools.
    • Considerations for Hardening Windows.
  • Firewalls.
    • Network Architecture Basics.
    • TCP/IP Networking.
    • Security Business Processes.
    • SmoothWall Hardware Requirements.
    • SmoothWall Express Versus SmoothWall Corporate.
    • Installing SmoothWall.
    • Administering the SmoothWall Firewall.
    • Creating a VPN on the SmoothWall Firewall.
    • Windows-Based Firewalls.
  • Port Scanners.
    • Overview of Port Scanners.
    • Considerations for Port Scanning.
    • Uses for Port Scanners.
  • Vulnerability Scanners.
    • Identifying Security Holes in Your Systems.
    • Vulnerability Scanners to the Rescue.
    • Considerations for Vulnerability Scanning.
    • What Vulnerability Testing Doesn't Find.
  • Network Sniffers.
    • A Brief History of Ethernet.
    • Considerations for Network Sniffing.
    • TCP/IP Packet Headers.
  • Intrusion Detection Systems.
    • NIDS Signature Examples.
    • The Problem of NIDS False Positives.
    • Getting the Most Out of Your IDS.
    • Configuring Snort for Maximum Performance.
    • Host-Based Intrusion Detection.
  • Analysis and Management Tools.
    • Using Databases and Web Servers to Manage Your Security Data.
    • The Birth of an Open Source Project.
    • Encryption Tools.
    • Types of Encryption.
    • Virtual Private Networks.
  • Wireless Tools.
    • Wireless LAN Technology.
    • Dangers of Wireless LANs.
    • The "War-Driving" Phenomenon.
    • Performing a Wireless Network Security Assessment.
    • Steps for More Secure Wireless LANs.
  • Forensic Tools.
    • Uses for Computer Forensic Tools.
    • Building an Incident Response Plan.
    • Preparing for Good Forensic Data.
    • Where to Look for Forensic Data.
    • Tenets of Good Forensic Analysis.
    • Forensic Analysis Tools.
    • Reviewing Log Files.
    • Making Copies of Forensic Evidence.
  • More on Open Source Software.
    • Open Source Resources.
    • Joining the Open Source Movement.
    • More Open Source Security Tools.
  • Appendix A Open Source Licenses.
  • Appendix B Basic Linux/UNIX Commands.
  • Appendix C Well-Known TCP/IP Port Numbers.
  • Appendix D General Permission and Waiver Form.
  • Appendix E.
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Prentice Hall
Auteur(s) Tony Howlett
Collection Bruce Perens' Open Source Series
Parution 15/09/2004
Nb. de pages 578
Couverture Broché
Poids 1165g
Intérieur Noir et Blanc
EAN13 9780321194435

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription