Find your perfect holiday reading
How to Cheat at Configuring Open Source Security Tools - How to Cheat (Paperback)
  • How to Cheat at Configuring Open Source Security Tools - How to Cheat (Paperback)
zoom

How to Cheat at Configuring Open Source Security Tools - How to Cheat (Paperback)

(author), (author), (author), (author), (author)
£37.99
Paperback 528 Pages / Published: 28/06/2007
  • We can order this

Usually dispatched within 3 weeks

  • This item has been added to your basket
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network.

Publisher: Syngress Media,U.S.
ISBN: 9781597491709
Number of pages: 528
Weight: 900 g
Dimensions: 235 x 191 x 27 mm

You may also be interested in...

Everyday Cryptography
Added to basket
Social Engineering
Added to basket
Ghost in the Wires
Added to basket
Intercept
Added to basket
£9.99
Paperback
Data and Goliath
Added to basket
£12.99
Paperback
Surveillance Valley
Added to basket
Exploding Data
Added to basket
£20.00
Hardback
Cybersecurity Essentials
Added to basket
Cyber Security
Added to basket
£29.99
Paperback
Cult of the Dead Cow
Added to basket
£14.99
Paperback
Hello World
Added to basket
£8.99
Paperback
The Perfect Weapon
Added to basket
Click Here to Kill Everybody
Added to basket
The Truth Machine
Added to basket

Please sign in to write a review

Your review has been submitted successfully.