[1825 days] How to Cheat at Configuring Open Source Security Tools
[1825 days] How to Cheat at Configuring Open Source Security Tools [1825 days] How to Cheat at Configuring Open Source Security Tools

[1825 days] How to Cheat at Configuring Open Source Security Tools

CHI TIẾT SẢN PHẨM

Mã sản phẩm:
9781597491709
Tồn kho:
Còn hàng
Nhà xuất bản:
Loại bìa:
Page Fidelity
Ngôn ngữ:
English
Tác giả:
Gregg, Michael; Seagren, Eric; Orebaugh, Angela; Jonkman, Matt; Marty, Raffael


Special Price 1,320,000 VNĐ

Còn VNĐ nữa bạn sẽ được miễn phí giao hàngTìm hiểu thêm

Thời gian giao hàng Xem thêm

Chính sách đổi trả Xem thêm

Số lượng

The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.

* Take Inventory
See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.
* Use Nmap
Learn how Nmap has more features and options than any other free scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.
* Perform Basic Hardening
Put an IT security policy in place so that you have a concrete set of standards against which to measure.
* Install and Configure Snort and Wireshark
Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep Snort signature files current.
* Troubleshoot Network Problems
See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor to know if they’re being exceeded and watch for unauthorized traffic on your network.

*Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools for readers
*Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't

Sản phẩm liên quan

New
[1825 days] Mesoporous Molecular Sieves 1998

The original properties of mesoporous molecular sieves are so unique that the design of most existin..

6,477,000 VNĐ

New
[1825 days] Strauder v. West Virginia, 100 U.S. 303

This title is from the Hayes Barton Press "Originals" series, a collection of classic fiction and no..

38,000 VNĐ

New
[1825 days] Sir Humphrey Gilbert's Voyage to Newfoundland

This title is from the Hayes Barton Press "Originals" series, a collection of classic fiction and no..

38,000 VNĐ

New
[30 days] Control of Induction Motors

This book is a comprehensive reference source for practicing engineers and students specializing in ..

1,372,000 VNĐ

New
[1825 days] Non-Invasive Monitoring of Multiphase Flows

Non-Invasive Monitoring of Multiphase Flows is a result of the latest advances realized in non-invas..

11,049,000 VNĐ

New
[1825 days] Joining of Materials and Structures: From Pragmatic Process to Enabling Technology

Joining of Materials and Structures is the first and only complete and highly readable treatment of ..

4,826,000 VNĐ

New
[1825 days] ADV IN CARBOHYDRATE CHEM & BIOCHEM VOL42

ADV IN CARBOHYDRATE CHEM & BIOCHEM VOL42..

1,853,000 VNĐ

New
[1825 days] Maintenance Fundamentals

No matter which industry a company is a part of, its profitability, like its products, is driven by ..

2,870,500 VNĐ

0898536989