๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

How to Cheat at Configuring Open Source Security Tools

โœ Scribed by Renaud Deraison, Noam Rathaus, HD Moore, Raven Alder, George Theall, Andy Johnston, Jimmy Alderson


Publisher
Syngress; Elsevier Science [distributor]
Year
2004
Tongue
English
Leaves
530
Series
Jay Beale's Open Source Security
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.


๐Ÿ“œ SIMILAR VOLUMES


How to Cheat at Configuring Open Source
โœ Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐Ÿ› Syngress; Elsevier Science [distributor] ๐ŸŒ English

<b>The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using produc

Open Source Security Tools: Practical Gu
โœ Tony Howlett ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Prentice Hall PTR ๐ŸŒ English

This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows network and system administrators how to use them to solve common security problem. Open Source Security Tools is a practicum. It tells readers what they need to do to secure their netwo

How to Cheat at Voip Security (How to Ch
โœ Thomas Porter, Michael Gough ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐ŸŒ English

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us

How to Cheat at Voip Security (How to Ch
โœ Thomas Porter, Michael Gough ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐ŸŒ English

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us

Open Source Security Tools: Practical Gu
โœ Tony Howlett ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Prentice Hall ๐ŸŒ English

<p>Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.</p> <p>Written with the harried IT manager in mind, <i> <b>Open Source Security Tools

Open Source Security Tools: Practical Gu
โœ Tony Howlett ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Prentice Hall PTR ๐ŸŒ English

This book is now classified by the publisher as "out of print" and this is a reprint. I just got off the phone with Prentice Hall, and the CD-ROM does NOT come with the book, regardless what the Amazon listing says. My lowered rating does not reflect the quality or content of the book, rather a