Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Configuring Open Source Security Tools

The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.

* Take Inventory
See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.
* Use Nmap
Learn how Nmap has more features and options than any other free scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.
* Perform Basic Hardening
Put an IT security policy in place so that you have a concrete set of standards against which to measure.
* Install and Configure Snort and Wireshark
Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep Snort signature files current.
* Troubleshoot Network Problems
See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor to know if theyre being exceeded and watch for unauthorized traffic on your network.

*Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools for readers
*Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't

About the Author

Michael Gregg is the President of Superior Solutions, Inc. and has more than 20 years experience in the IT field. He holds two associates degrees, a bachelors degree, and a masters degree and is certified as: CISSP, MCSE, MCT, CTT+, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CCE, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and TICSA. Eric Seagren, CISSP, CISA, ISSAP, JPMorganChase has 10 years experience in IT Security and has spent the last 7 years at, one of the largest financial institutions in the world. Eric has contributed to several computer security books including: Hacking Exposed: Cisco Networks (McGraw-Hill, ISBN: 0072259175), Configuring Checkpoint NGX (Syngress, ISBN: 1597490318), and Hardening Network Security (McGraw-Hill, ISBN: 00725557032). Angela Orebaugh (, GCIA, GCFW, GCIH, GSEC, CCNA) is a Senior Scientist in the Advanced Technology Research Center of Sytex, Inc. where she works with a specialized team to advance the state of the art in information systems security. She has over 10 years experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. She has a Masters in Computer Science, and is currently pursuing her Ph.D. with a concentration in Information Security at George Mason University. Matt Jonkman has been involved in Information Technology since the late 1980s. He has a strong background in banking and network security, network engineering, incident response, and Intrusion Detection. Matt is founder of Bleeding Edge Threats (www.bleedingedgethreats.net), formerly Bleeding Snort. Bleeding Edge Threats is an open-source research community for Intrusion Detection Signatures and much more. Matt spent 5 years serving abroad in the Army before attending Indiana State University and the Rose-Hulman Institute. Raffael Marty (GCIA, CISSP) is the manager of ArcSight's Strategic Application Solution Team
(HTML tags aren't allowed.)

The Web Designer's Roadmap
The Web Designer's Roadmap

The Web Designer's Roadmap is a full-color book about the creative process and the underlying principles that govern that process.

While other books cover the nuts 'n' bolts of how to design the elements that make up websites, this book outlines how effective designers go about their work,...

Perl for Oracle DBAs
Perl for Oracle DBAs
Perl is a very powerful tool for Oracle database administrators, but too few DBAs realize how helpful Perl can be in managing, monitoring, and tuning Oracle9i, Oracle8i, and earlier databases. You don't need to be a Perl expert to reap the rewards of reading Perl for Oracle DBAs. The book explains what you need to know about Perl, profiles...
Optimal Control of Constrained Piecewise Affine Systems
Optimal Control of Constrained Piecewise Affine Systems

One of the most important and challenging problems in control is the derivation of systematic tools for the computation of controllers for constrained nonlinear systems that can guarantee closed-loop stability, feasibility, and optimality with respect to some performance index. This book focuses on the efficient and systematic computation of...

Windows 8.1 Plain & Simple
Windows 8.1 Plain & Simple

Learn the simplest ways to get things done with Windows 8.1

Get the full-color, visual guide that makes learning Windows 8.1 plain and simple! Follow the book’s easy steps and screenshots and clear, concise language to learn the most expedient way to perform tasks and solve problems in Windows 8.1.


Perspectives on LHC Physics
Perspectives on LHC Physics
The Large Hadron Collider (LHC), located at CERN, Geneva, Switzerland, will be the world's largest and highest energy and highest intensity particle accelerator. Here is a timely book with several perspectives on the hoped-for discoveries from the LHC.

This book provides an overview on the techniques that will be crucial for finding new...

The Routledge Guidebook to Wittgenstein's Philosophical Investigations (The Routledge Guides to the Great Books)
The Routledge Guidebook to Wittgenstein's Philosophical Investigations (The Routledge Guides to the Great Books)

Wittgenstein is one of the most important and influential twentieth-century philosophers in the western tradition. In his Philosophical Investigations he undertakes a radical critique of analytical philosophy's approach to both the philosophy of language and the philosophy of mind. The Routledge Guidebook to Wittgenstein's...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy