Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Source Security Tools: Practical Guide to Security Applications, A

Buy

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. Seasoned security expert Tony Howlett has reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the “best of breed” for all major areas of information security.

Inside, you’ll find everything from how to harden Linux and Windows systems to how to investigate breaches with Sleuth Kit, Autopsy Forensic Browser, and Forensic Tool Kit. For each security task described, the author reviews the best open source tools and how to use them and also provides a case study and sample implementation. Covered tasks include:

  • Installing an open source firewall using Ipchains, Iptables, Turtle firewall, or Smoothwall
  • Scanning ports and testing for vulnerabilities using Nmap, Nlog, Nmap for Windows, Nessus,and NessusWX
  • Using sniffers and network-intrusion systems, including Tcpdump, Ethereal, Windump, Snort™, and Snort™ for Windows
  • Tracking and analyzing collected data with Swatch, ACID, and NCC
  • Encrypting communications with PGP, GnuPG, SSH, and Free S/WAN

This handy reference also tackles the emerging field of wireless security and covers tools such as Kismet Wireless, Airsnort, and Netstumber. An accompanying CD-ROM contains full versions of the tools for easy access and installation, as well as RFCs and other useful information.

Whether you’re a Windows system administrator or a network administrator, you will come away with an understanding of how open source security tools can help protect your organization and further your own career.

About the Author

Tony Howlett is the president of Network Security Services, a computer-security application service provider built entirely on open source software. A Certified Information Systems Security Professional (CISSP) and GIAC Systems and Network Auditor (GNSA), he has fourteen years of experience, including running a major regional ISP/CLEC and building a nationwide ATM/DSL network. Mr. Howlett is a frequent speaker on computer security and technology topics and has written for SysAdmin, Computer Currents, Windows Web Solutions, Security Administrator, and other magazines.

(HTML tags aren't allowed.)

Essential SQLAlchemy: Mapping Python to Databases
Essential SQLAlchemy: Mapping Python to Databases

Dive into SQLAlchemy, the popular, open-source code library that helps Python programmers work with relational databases such as Oracle, MySQL, PostgresSQL, and SQLite. Using real-world examples, this practical guide shows you how to build a simple database application with SQLAlchemy, and how to connect to multiple databases...

PHP 5 Power Programming (Bruce Perens Open Source)
PHP 5 Power Programming (Bruce Perens Open Source)

In this book, PHP 5's co-creator and two leading PHP developers show you how to make the most of PHP 5's industrial-strength enhancements in any projectno matter how large or complex. Their unique insights and realistic examples illuminate PHP 5's new object model, powerful design patterns, improved XML Web services support, and...

Delivering Business Intelligence with Microsoft SQL Server 2005
Delivering Business Intelligence with Microsoft SQL Server 2005
Transform disparate enterprise data into actionable business intelligence

Put timely, mission-critical information in the hands of employees across your organization using Microsoft SQL Server 2005 and the comprehensive information in this unique resource. Delivering Business Intelligence with Microsoft SQL Server...


Borges, Buddhism and World Literature: A Morphology of Renunciation Tales (Literatures of the Americas)
Borges, Buddhism and World Literature: A Morphology of Renunciation Tales (Literatures of the Americas)
This book follows the renunciation story in Borges and beyond, arguing for its centrality as a Borgesian compositional trope and as a Borgesian prism for reading a global constellation of texts. The renunciation story at the heart of Buddhism, that of a king who leaves his palace to become an ascetic, fascinated Borges because of its...
Design - Build - Run: Applied Practices and Principles for Production Ready Software Development (Wrox Programmer to Programmer)
Design - Build - Run: Applied Practices and Principles for Production Ready Software Development (Wrox Programmer to Programmer)
This unique and critical book shares no-fail secrets for building software and offers tried-and-true practices and principles for software design, development, and testing for mission-critical systems that must not fail. A veteran software architect walks you through the lifecycle of a project as well as each area of production...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy