Open Source Security Tools A Practical Guide to Security Applications

ISBN-10: 0321194438
ISBN-13: 9780321194435
Edition: 2005
Authors: Tony Howlett
List price: $49.99
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows network and system administrators how to use them to solve common security problem. Open Source Security Tools is a practicum. It tells  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
History of Western Art Online content $4.95 $1.99
Add to cart
Study Briefs
History of World Philosophies Online content $4.95 $1.99
Add to cart
Study Briefs
American History Volume 1 Online content $4.95 $1.99
Add to cart
Study Briefs
History of Western Music Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $49.99
Copyright year: 2005
Publisher: Prentice Hall PTR
Publication date: 7/29/2004
Binding: Paperback
Pages: 608
Size: 7.00" wide x 9.00" long x 1.50" tall
Weight: 2.486
Language: English

This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows network and system administrators how to use them to solve common security problem. Open Source Security Tools is a practicum. It tells readers what they need to do to secure their networks, introduces best-in-class tools, and shows readers how to use them. For each security task described, Howlett reviews the best open source tools, shows readers how to use them, and takes them through a sample implementation and case studies. At the end of each chapter, Howlett will offer pointers to other good open source tools that are worth investigating. The companion CD includes fully dowloadable versions of the tools, so readers can work along with the text. Newcomers to security will leave with enough knowledge and experience to deploy solutions and further their IT careers. Readers will learn to: * Secure their perimeter with open source scanners like Nessus.* Receive early warning about attempted breakins from IDS systems like Snort.* Install a firewall to keep hackers at bay (Turtle).* Use encyrption to secure email and other sensitive data (PGP)* If the worst happens, run forensics tools to investigate a breakin after the fact, like Autopsy or SleuthKit.This book is part of the Bruce Perens Open Source Series.

Preface
Audience
Contents
CD-ROM Contents and Organization
Tools Index
Information Security and Open Source Software
The Practice of Information Security
The State of Computer Crime
Info-Security Business Risks
Open Source History
Open Source Advantages
When Open Source May Not Fit Your Needs
Windows and Open Source
Open Source Licenses
Operating System Tools
Hardening Your Security Tool System
traceroute (UNIX) or tracert (Windows): Network Diagnostic Tools
Considerations for Hardening Windows
Firewalls
Network Architecture Basics
TCP/IP Networking
Security Business Processes
Smooth Wall Hardware Requirements
Smooth Wall Express Versus Smooth-Wall Corporate
Installing SmoothWall
Administering the SmoothWall Firewall
Creating a VPN on the SmoothWall Firewall
Windows-Based Firewalls
Port Scanners
Overview of Port Scanners
Considerations for Port Scanning
Uses for Port Scanners
Vulnerability Scanners
Identifying Security Holes in Your Systems
Vulnerability Scanners to the Rescue
Considerations for Vulnerability Scanning
What Vulnerability Testing Doesn't Find
Network Sniffers
A Brief History of Ethernet
Considerations for Network Sniffing
TCP/IP Packet Headers
Intrusion Detection Systems
NIDS Signature Examples
The Problem of NIDS False Positives
Getting the Most Out of Your IDS
Configuring Snort for Maximum Performance
Host-Based Intrusion Detection
Analysis and Management Tools
Using Databases and Web Servers to Manage Your Security Data
The Birth of an Open Source Project
Encryption Tools
Types of Encryption
Virtual Private Networks
Wireless Tools
Wireless LAN Technology Overview
Dangers of Wireless LANs
The "War-Driving" Phenomenon
Performing a Wireless Network Security Assessment
Steps for More Secure Wireless LANs
Forensic Tools
Uses for Computer Forensic Tools
Building an Incident Response Plan
Preparing for Good Forensic Data
Where to Look for Forensic Data
Tenets of Good Forensic Analysis
Forensic Analysis Tools
Reviewing Log Files
Making Copies of Forensic Evidence
More on Open Source Software
Open Source Resources
Joining the Open Source Movement
More Open Source Security Tools
Open Source Licenses
Basic Linux/UNIX Commands
Well-Known TCP/IP Port Numbers
General Permission and Waiver Form
Appendix E
References
Web Sites
Books and Articles
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×