| |
| |
Preface | |
| |
| |
Audience | |
| |
| |
Contents | |
| |
| |
CD-ROM Contents and Organization | |
| |
| |
Tools Index | |
| |
| |
| |
Information Security and Open Source Software | |
| |
| |
The Practice of Information Security | |
| |
| |
The State of Computer Crime | |
| |
| |
Info-Security Business Risks | |
| |
| |
Open Source History | |
| |
| |
Open Source Advantages | |
| |
| |
When Open Source May Not Fit Your Needs | |
| |
| |
Windows and Open Source | |
| |
| |
Open Source Licenses | |
| |
| |
| |
Operating System Tools | |
| |
| |
Hardening Your Security Tool System | |
| |
| |
traceroute (UNIX) or tracert (Windows): Network Diagnostic Tools | |
| |
| |
Considerations for Hardening Windows | |
| |
| |
| |
Firewalls | |
| |
| |
Network Architecture Basics | |
| |
| |
TCP/IP Networking | |
| |
| |
Security Business Processes | |
| |
| |
Smooth Wall Hardware Requirements | |
| |
| |
Smooth Wall Express Versus Smooth-Wall Corporate | |
| |
| |
Installing SmoothWall | |
| |
| |
Administering the SmoothWall Firewall | |
| |
| |
Creating a VPN on the SmoothWall Firewall | |
| |
| |
Windows-Based Firewalls | |
| |
| |
| |
Port Scanners | |
| |
| |
Overview of Port Scanners | |
| |
| |
Considerations for Port Scanning | |
| |
| |
Uses for Port Scanners | |
| |
| |
| |
Vulnerability Scanners | |
| |
| |
Identifying Security Holes in Your Systems | |
| |
| |
Vulnerability Scanners to the Rescue | |
| |
| |
Considerations for Vulnerability Scanning | |
| |
| |
What Vulnerability Testing Doesn't Find | |
| |
| |
| |
Network Sniffers | |
| |
| |
A Brief History of Ethernet | |
| |
| |
Considerations for Network Sniffing | |
| |
| |
TCP/IP Packet Headers | |
| |
| |
| |
Intrusion Detection Systems | |
| |
| |
NIDS Signature Examples | |
| |
| |
The Problem of NIDS False Positives | |
| |
| |
Getting the Most Out of Your IDS | |
| |
| |
Configuring Snort for Maximum Performance | |
| |
| |
Host-Based Intrusion Detection | |
| |
| |
| |
Analysis and Management Tools | |
| |
| |
Using Databases and Web Servers to Manage Your Security Data | |
| |
| |
The Birth of an Open Source Project | |
| |
| |
| |
Encryption Tools | |
| |
| |
Types of Encryption | |
| |
| |
Virtual Private Networks | |
| |
| |
| |
Wireless Tools | |
| |
| |
Wireless LAN Technology Overview | |
| |
| |
Dangers of Wireless LANs | |
| |
| |
The "War-Driving" Phenomenon | |
| |
| |
Performing a Wireless Network Security Assessment | |
| |
| |
Steps for More Secure Wireless LANs | |
| |
| |
| |
Forensic Tools | |
| |
| |
Uses for Computer Forensic Tools | |
| |
| |
Building an Incident Response Plan | |
| |
| |
Preparing for Good Forensic Data | |
| |
| |
Where to Look for Forensic Data | |
| |
| |
Tenets of Good Forensic Analysis | |
| |
| |
Forensic Analysis Tools | |
| |
| |
Reviewing Log Files | |
| |
| |
Making Copies of Forensic Evidence | |
| |
| |
| |
More on Open Source Software | |
| |
| |
Open Source Resources | |
| |
| |
Joining the Open Source Movement | |
| |
| |
More Open Source Security Tools | |
| |
| |
| |
Open Source Licenses | |
| |
| |
| |
Basic Linux/UNIX Commands | |
| |
| |
| |
Well-Known TCP/IP Port Numbers | |
| |
| |
| |
General Permission and Waiver Form | |
| |
| |
Appendix E | |
| |
| |
References | |
| |
| |
Web Sites | |
| |
| |
Books and Articles | |
| |
| |
Index | |