<p>Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.</p> <p>Written with the harried IT manager in mind, <i> <b>Open Source Security Tools
Open Source Security Tools: Practical Guide to Security Applications
โ Scribed by Tony Howlett
- Publisher
- Prentice Hall PTR
- Year
- 2004
- Tongue
- English
- Leaves
- 600
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows network and system administrators how to use them to solve common security problem. Open Source Security Tools is a practicum. It tells readers what they need to do to secure their networks, introduces best-in-class tools, and shows readers how to use them. For each security task described, Howlett reviews the best open source tools, shows readers how to use them, and takes them through a sample implementation and case studies. At the end of each chapter, Howlett will offer pointers to other good open source tools that are worth investigating. The companion CD includes fully dowloadable versions of the tools, so readers can work along with the text. Newcomers to security will leave with enough knowledge and experience to deploy solutions and further their IT careers. Readers will learn to: * Secure their perimeter with open source scanners like Nessus. Receive early warning about attempted breakins from IDS systems like Snort. Install a firewall to keep hackers at bay (Turtle). Use encyrption to secure email and other sensitive data (PGP) If the worst happens, run forensics tools to investigate a breakin after the fact, like Autopsy or SleuthKit.This book is part of the Bruce Perens Open Source Series.
๐ SIMILAR VOLUMES
This book is now classified by the publisher as "out of print" and this is a reprint. I just got off the phone with Prentice Hall, and the CD-ROM does NOT come with the book, regardless what the Amazon listing says. My lowered rating does not reflect the quality or content of the book, rather a
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff" their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest" open source s
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons ava
<b>The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using produc
Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.Written with the harried IT manager in mind, Open Source Security Tools is a practical, h