Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Configuring Open Source Security Tools

Buy
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.

* Take Inventory
See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.
* Use Nmap
Learn how Nmap has more features and options than any other free scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.
* Perform Basic Hardening
Put an IT security policy in place so that you have a concrete set of standards against which to measure.
* Install and Configure Snort and Wireshark
Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep Snort signature files current.
* Troubleshoot Network Problems
See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor to know if theyre being exceeded and watch for unauthorized traffic on your network.

*Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools for readers
*Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't

About the Author

Michael Gregg is the President of Superior Solutions, Inc. and has more than 20 years experience in the IT field. He holds two associates degrees, a bachelors degree, and a masters degree and is certified as: CISSP, MCSE, MCT, CTT+, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CCE, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and TICSA. Eric Seagren, CISSP, CISA, ISSAP, JPMorganChase has 10 years experience in IT Security and has spent the last 7 years at, one of the largest financial institutions in the world. Eric has contributed to several computer security books including: Hacking Exposed: Cisco Networks (McGraw-Hill, ISBN: 0072259175), Configuring Checkpoint NGX (Syngress, ISBN: 1597490318), and Hardening Network Security (McGraw-Hill, ISBN: 00725557032). Angela Orebaugh (, GCIA, GCFW, GCIH, GSEC, CCNA) is a Senior Scientist in the Advanced Technology Research Center of Sytex, Inc. where she works with a specialized team to advance the state of the art in information systems security. She has over 10 years experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. She has a Masters in Computer Science, and is currently pursuing her Ph.D. with a concentration in Information Security at George Mason University. Matt Jonkman has been involved in Information Technology since the late 1980s. He has a strong background in banking and network security, network engineering, incident response, and Intrusion Detection. Matt is founder of Bleeding Edge Threats (www.bleedingedgethreats.net), formerly Bleeding Snort. Bleeding Edge Threats is an open-source research community for Intrusion Detection Signatures and much more. Matt spent 5 years serving abroad in the Army before attending Indiana State University and the Rose-Hulman Institute. Raffael Marty (GCIA, CISSP) is the manager of ArcSight's Strategic Application Solution Team
(HTML tags aren't allowed.)

Enterprise iPhone and iPad Administrator's Guide (Books for Professionals by Professionals)
Enterprise iPhone and iPad Administrator's Guide (Books for Professionals by Professionals)

Are you an IT professional involved in deploying the iPhone and or iPad in your company or organization? Do you have fellow employees who are eager to use their iPhones and iPads for work? Then this is the book for you. Enterprise iPhone and iPad Administrator’s Guide provides step-by-step instructions on how to deploy and...

Algorithmic Aspects of Wireless Sensor Networks: First International Workshop, ALGOSENSORS 2004
Algorithmic Aspects of Wireless Sensor Networks: First International Workshop, ALGOSENSORS 2004

This volume contains the contributed papers and invited talks presented at the 1stInternationalWorkshoponAlgorithmicAspectsofWirelessSensorNetworks (ALGOSENSORS 2004), which was held July 16, 2004, in Turku, Finland, - located with the 31st International Colloquium on Automata, Languages, and Programming (ICALP 2004). Wireless ad hoc sensor...

Linux Socket Programming by Example
Linux Socket Programming by Example
Linux Socket Programming by Example begins with a very basic introduction to the fundamentals of socket level programming. As the chapters progress, you are introduced to related concepts, such as forming network addresses, Ipv6, the TCP/IP protocol suite and options, writing servers, and creating secure applications. You will also learn about...

Introductory Biostatistics
Introductory Biostatistics
The nuts-and-bolts of biostatistics–without the anxiety

To students in public health, dentistry, nursing, and other health disciplines, the introductory course in biostatistics conjures up dread images of mind-numbing formulas and dry-as-bones texts. This text, adapted from and expanding on his bestselling Health and Numbers (Wiley), will...

St. James Encyclopedia of Popular Culture: 3
St. James Encyclopedia of Popular Culture: 3
Thirty some years ago Ray Browne and several of his colleagues provided a forum for the academic study of popular culture by forming first the Journal of Popular Culture and later the Popular Culture Association and the Center for the Study of Popular Culture at Bowling Green State University. Twenty some years ago Thomas Inge thought...
Windows Azure programming patterns for Start-ups
Windows Azure programming patterns for Start-ups
Windows Azure was officially announced at PDC 2008, but looking back, I had a quick look in the kitchen of Windows Azure in 2007 while I was visiting Redmond during the Lead Enterprise Architect Program (LEAP) sessions. Pat Helland, a senior architect at Microsoft, gave a talk on The irresistible forces meet the movable objects....
©2021 LearnIT (support@pdfchm.net) - Privacy Policy