How to cheat at configuring Open Source security tools
The perfect book for multi-tasked security professionals and IT managers responsible for securing corporate networks!
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Rockland, Mass. :
Syngress
2007.
|
Colección: | EBSCO Academic eBook Collection Complete.
|
Acceso en línea: | Conectar con la versión electrónica |
Ver en Universidad de Navarra: | https://innopac.unav.es/record=b31650570*spi |
Tabla de Contenidos:
- Cover
- Contents
- Chapter 1. Testing and Auditing Your Systems
- Introduction
- Taking Inventory
- Vulnerability Scanning
- OSSTMM
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 2. Protecting Your Perimeter
- Introduction
- Firewall Types
- Firewall Architectures
- Implementing Firewalls
- Providing Secure Remote Access
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 3. Protecting Network Resources
- Introduction
- Performing Basic Hardening
- Hardening Windows Systems
- Hardening Linux Systems
- Hardening Infrastructure Devices
- Patching Systems
- Personal Firewalls
- Providing Antivirus and Antispyware Protection
- Encrypting Sensitive Data
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 4. Introducing Snort
- Introduction
- How an IDS Works
- Where Snort Fits
- Snort System Requirements
- Exploring Snort's Features
- Using Snort on Your Network
- Security Considerations with Snort
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 5. Installing Snort 2.6
- Introduction
- Choosing the Right OS
- Hardware Platform Considerations
- Installing Snort
- Configuring Snort
- Testing Snort
- Maintaining Snort
- Updating Snort
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 6. Configuring Snort and Add-Ons
- Placing Your NIDS
- Configuring Snort on a Windows System
- Configuring Snort on a Linux System
- Demonstrating Effectiveness
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 7. Introducing Wireshark: Network Protocol Analyzer
- Introduction
- What is Wireshark?
- Supporting Programs
- Using Wireshark in Your Network Architecture
- Using Wireshark for Network Troubleshooting
- Using Wireshark for System Administration
- Securing Ethereal
- Optimizing Wireshark
- Advanced Sniffing Techniques
- Securing Your Network from Sniffers
- Employing Detection Techniques
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 8. Getting and Installing Wireshark
- Introduction
- Getting Wireshark
- Packet Capture Drivers
- Installing Wireshark on Windows
- Installing Wireshark on Linux
- Installing Wireshark on Mac OSX
- Installing Wireshark from Source
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 9. Using Wireshark
- Introduction
- Getting Started with Wireshark
- Exploring the Main Window
- Other Window Components
- Exploring the Menus
- View
- Go
- Capture
- Analyze
- Statistics
- Help
- Pop-up Menus
- Using Command-line Options
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 10. Network Reporting and Troubleshooting with other Tools
- Introduction
- Reporting on Bandwidth Usage and Other Metrics
- Collecting Data for Analysis
- Understanding SNMP
- Troubleshooting Network Problems from the Command Line.