How to cheat at configuring Open Source security tools

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products li...

Descripción completa

Detalles Bibliográficos
Otros Autores: Alder, Raven (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Rockland, MA : Oxford : Syngress ; Elsevier Science [distributor] 2007.
Edición:1st edition
Colección:How to Cheat
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627081206719
Tabla de Contenidos:
  • Front Cover; How to Cheat at Configuring: Open Source Security Tools; Copyright Page; Contents; Chapter 1. Testing and Auditing Your Systems; Introduction; Taking Inventory; Vulnerability Scanning; OSSTMM; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Protecting Your Perimeter; Introduction; Firewall Types; Firewall Architectures; Implementing Firewalls; Providing Secure Remote Access; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Protecting Network Resources; Introduction; Performing Basic Hardening; Hardening Windows Systems
  • Hardening Linux SystemsHardening Infrastructure Devices; Patching Systems; Personal Firewalls; Providing Antivirus and Antispyware Protection; Encrypting Sensitive Data; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Introducing Snort; Introduction; How an IDS Works; Where Snort Fits; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Installing Snort 2.6; Introduction; Choosing the Right OS; Hardware Platform Considerations
  • Installing SnortConfiguring Snort; Testing Snort; Maintaining Snort; Updating Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Configuring Snort and Add-Ons; Placing Your NIDS; Configuring Snort on a Windows System; Configuring Snort on a Linux System; Demonstrating Effectiveness; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Introducing Wireshark: Network Protocol Analyzer; Introduction; What is Wireshark?; Supporting Programs; Using Wireshark in Your Network Architecture; Using Wireshark for Network Troubleshooting
  • Using Wireshark for System AdministrationSecuring Ethereal; Optimizing Wireshark; Advanced Sniffing Techniques; Securing Your Network from Sniffers; Employing Detection Techniques; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Getting and Installing Wireshark; Introduction; Getting Wireshark; Packet Capture Drivers; Installing Wireshark on Windows; Installing Wireshark on Linux; Installing Wireshark on Mac OSX; Installing Wireshark from Source; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Using Wireshark; Introduction
  • Getting Started with WiresharkExploring the Main Window; Other Window Components; Exploring the Menus; View; Go; Capture; Analyze; Statistics; Help; Pop-up Menus; Using Command-line Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Network Reporting and Troubleshooting with other Tools; Introduction; Reporting on Bandwidth Usage and Other Metrics; Collecting Data for Analysis; Understanding SNMP; Troubleshooting Network Problems from the Command Line; Additional Troubleshooting Tools; Summary; Solutions Fast Track; Frequently Asked Questions
  • Chapter 11. Wireless Monitoring and Intrusion Detection