𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Network performance and security : testing and analyzing using open source and low-cost tools

✍ Scribed by Chapman, Chris


Publisher
Elsevier Ltd, Syngress
Year
2016
Tongue
English
Leaves
361
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assetsβ€”such as servers, switches, hypervisor hosts, routers, and firewallsβ€”using publicly available tools for network inventory.

The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.

Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.

    • Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested
      • Focuses on practical, real world implementation and testing
        • Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing
          • Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration
            • Provides analysis in addition to step by step methodologies

              ✦ Table of Contents


              Content:
              Front matter,Copyright,DedicationEntitled to full textChapter 1 - Introduction to practical security and performance testing, Pages 1-14
              Chapter 2 - Getting organized with initial audit of the network, Pages 15-37
              Chapter 3 - Locking down the infrastructure: Internet, Wi-Fi, wired, VPN, WAN, and the core, Pages 39-83
              Chapter 4 - Locking down and optimizing the windows client, Pages 85-123
              Chapter 5 - Server patterns, Pages 125-152
              Chapter 6 - Testing for security flaws using penetration testing, Pages 153-193
              Chapter 7 - Using Wireshark and TCP dump to visualize traffic, Pages 195-225
              Chapter 8 - Using SNORT, Pages 227-258
              Chapter 9 - Live traffic analytics using β€œSecurity Onion”, Pages 259-294
              Chapter 10 - Traffic performance testing in the network, Pages 295-317
              Chapter 11 - Build your own network elements, Pages 319-339
              Chapter 12 - Request for proposal andΒ proof of concept example usecases, Pages 341-353
              Subject Index, Pages 355-366


              πŸ“œ SIMILAR VOLUMES


              Network performance and security: testin
              ✍ Chapman, Chris πŸ“‚ Library πŸ“… 2016 πŸ› Elsevier Science;Elsevier Ltd 🌐 English

              Providing mid-level IT engineers with the practical tips and tricks they need to harden their IT infrastructure, this book shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and includes tactics on how to prepare and execute

              Network performance and security: testin
              ✍ Chapman, Chris πŸ“‚ Library πŸ“… 2016 πŸ› Elsevier Ltd 🌐 English

              Providing mid-level IT engineers with the practical tips and tricks they need to harden their IT infrastructure, this book shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and includes tactics on how to prepare and execute

              Network Performance Toolkit: Using Open
              ✍ Richard Blum πŸ“‚ Library πŸ“… 2003 πŸ› Wiley 🌐 English

              * In these times of reduced corporate budgets, this book shows how to test for performance problems and how to install and run freely available tools, instead of buying costly new hardware and software testing packages * Network performance is the #1 headache for network operators; this book giv

              Building Open Source Network Security To
              ✍ Mike Schiffman πŸ“‚ Library πŸ“… 2002 πŸ› Wiley 🌐 English

              Books on hacking, cracking, exploiting, and breaking software seem to get all of the attention in the security world. However, we need more works like Mike Schiffman's 'Building Open Source Network Security Tools' (BOSNST). I regret having waited so long to read BOSNST, but I'm glad I did. Schiff