How to Cheat at Configuring Open Source Security Tools
来源:互联网 发布:c语言 指针 pdf 编辑:程序博客网 时间:2024/05/22 14:57
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
The Perfect Reference for the Multitasked SysAdmin
See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.
* Use Nmap
Learn how Nmap has more features and options than any other free scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.
* Perform Basic Hardening
Put an IT security policy in place so that you have a concrete set of standards against which to measure.
* Install and Configure Snort and Wireshark
Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep Snort signature files current.
* Troubleshoot Network Problems
See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor to know if theyre being exceeded and watch for unauthorized traffic on your network.
*Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools for readers
*Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't
http://rapidshare.com/files/40882657/1597491705.zip
http://depositfiles.com/files/1142698
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.
* Take InventorySee how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.
* Use Nmap
Learn how Nmap has more features and options than any other free scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.
* Perform Basic Hardening
Put an IT security policy in place so that you have a concrete set of standards against which to measure.
* Install and Configure Snort and Wireshark
Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep Snort signature files current.
* Troubleshoot Network Problems
See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor to know if theyre being exceeded and watch for unauthorized traffic on your network.
*Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools for readers
*Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't
http://rapidshare.com/files/40882657/1597491705.zip
http://depositfiles.com/files/1142698
- How to Cheat at Configuring Open Source Security Tools
- How to Cheat at Managing Information Security
- How to Cheat at Voip Security
- How to Cheat at Configuring VmWare ESX Server
- How to Cheat at Configuring VmWare ESX Server (Paperback), Jun.2007.eBook-BBL
- How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
- How to Cheat at Designing Security for a Windows Server 2003 Network
- How to Cheat at IT Project Management
- How to Cheat at Microsoft Vista Administration
- How to Cheat at Securing Linux
- How to Cheat at Securing Linux
- open source Internet security framework & tools
- My Favorite Open Source Security Tools
- How to Cheat at Deploying and Securing RFID (How to Cheat) (Paperback), Oct.2007.eBook-BBL
- How to Cheat at Securing a Wireless Network
- How to Cheat at IIS 7 Server Administration
- How to Cheat at Securing a Wireless Network
- How to Cheat at Securing SQL Server 2005
- Pro InfoPath 2007
- html控件、html服务器控件和web服务器控件的区别
- Beginning VB 2005 Databases: From Novice to Professional
- java 中堆与栈的区别
- Inside SQLite
- How to Cheat at Configuring Open Source Security Tools
- Nortel Guide to VPN Routing for Security and VoIP
- 发布一个支持JavaScript的串口调试工具(免费使用)
- Microsoft SharePoint: Building Office 2007 Solutions in C# 2005
- C 语言设计模式(二) 单链表操作
- Beginning Google Maps Applications with Rails and Ajax: From Novice to Professional
- Beginning JBoss® Seam: From Novice to Professional
- hi baidu 个人主页 数据库设计 重现 V1.0
- 紧急寻人:北京工商大学的李阳同学