Books on hacking, cracking, exploiting, and breaking software seem to get all of the attention in the security world. However, we need more works like Mike Schiffman's 'Building Open Source Network Security Tools' (BOSNST). I regret having waited so long to read BOSNST, but I'm glad I did. Schiff
Open Source Network Security Tools for Beginners
β Scribed by Alienvault
- Publisher
- Alienvault
- Year
- 2017
- Tongue
- English
- Leaves
- 16
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
With so many open source tools available to help with network security, it can be tricky to figure out where to start, especially if you are an IT generalist who has been tasked with security. We all have to start somewhere.
The question is, where?
The sheer number of open source network security tools available can make it difficult to choose a place to start. This is complicated by the fact that most of the open source network security tools available have a very steep learning curve, and that many of these tools can be hazardous to run on a production network. Letβs take a look at a few of the tools available, which will not only provide some answers, but also help you learn more about the topic.
π SIMILAR VOLUMES
Learn how to protect your network with this guide to building complete and fully functional network security tools that meet the needs of your company.
This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows network and system administrators how to use them to solve common security problem. Open Source Security Tools is a practicum. It tells readers what they need to do to secure their netwo
Providing mid-level IT engineers with the practical tips and tricks they need to harden their IT infrastructure, this book shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and includes tactics on how to prepare and execute
Providing mid-level IT engineers with the practical tips and tricks they need to harden their IT infrastructure, this book shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and includes tactics on how to prepare and execute