přejít na obsah
Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT Náhled dokumentu
ZavřítNáhled dokumentu
Probíhá kontrola...

Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT

Autor Eric Seagren
Vydavatel: Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2006.
Vydání/formát:   Kniha : EnglishZobrazit všechny vydání a formáty
Databáze:WorldCat
Shrnutí:

Demonstrates how to get big dollar security for your network using freely available tools. This book explains security principles and then demonstrates how to achieve them using only freely available  Přečíst více...

Hodnocení:

(ještě nehodnoceno) 0 zobrazit recenze - Buďte první.

Předmětová hesla:
Více podobných

 

Vyhledat exemplář v knihovně

&AllPage.SpinnerRetrieving; Vyhledávání knihoven, které vlastní tento dokument...

Detaily

Typ dokumentu: Book
Všichni autoři/tvůrci: Eric Seagren
ISBN: 9781597491235 1597491233
OCLC číslo: 77541326
Popis: xiv, 493 p. ; 23 cm.
Obsahy: Chapter 1 Presenting the Business Case for Free Solutions 1 --
The Costs of Using Free Security Solutions 2 --
Training Costs 3 --
Hardware Costs 3 --
Consulting Costs 4 --
Hidden Costs 5 --
The Savings of Using Free Security Solutions 6 --
Purchase Costs 6 --
Maintenance Costs 7 --
Customization Costs 7 --
Comparing Free Solutions with Commercial Solutions 8 --
Strengths of Free Solutions 9 --
Weaknesses of Free Solutions 10 --
Evaluating Individual Solutions 12 --
"Selling" a Free Solution 16 --
Selling by Doing 17 --
Presenting a Proposal 17 --
Solutions Fast Track 19 --
Chapter 2 Protecting Your Perimeter 23 --
Firewall Types 24 --
Firewall Architectures 27 --
Screened Subnet 27 --
One-Legged 28 --
True DMZ 30 --
Implementing Firewalls 31 --
Hardware versus Software Firewalls 32 --
Configuring netfilter 32 --
Choosing a Linux Version 32 --
Choosing Installation Media 33 --
Linux Firewall Operation 36 --
Configuration Examples 42 --
GUIs 55 --
Smoothwall 76 --
Configuring Windows Firewall 85 --
Providing Secure Remote Access 86 --
Providing VPN Access 87 --
Using Windows as a VPN Concentrator 89 --
iPig 93 --
OpenSSL VPN 98 --
Providing a Remote Desktop 108 --
Windows Terminal Services 109 --
VNC 113 --
Using the X Window System 119 --
Providing a Remote Shell 125 --
Using Secure Shell 126 --
Using a Secure Shell GUI Client 128 --
Solutions Fast Track 131 --
Chapter 3 Protecting Network Resources 133 --
Performing Basic Hardening 134 --
Defining Policy 135 --
Access Controls 137 --
Authentication 137 --
Authorization 138 --
Auditing 138 --
Hardening Windows Systems 139 --
General Hardening Steps 139 --
Users and Groups 142 --
File-Level Access Controls 147 --
Additional Steps 152 --
Using Microsoft Group Policy Objects 153 --
Account Lockout Policy 159 --
Audit Policy 160 --
User Rights Assignment 160 --
Hardening Linux Systems 164 --
General Hardening Steps 164 --
Users and Groups 165 --
File-Level Access Controls 168 --
Using the Bastille Hardening Script 172 --
Using SELinux 173 --
Hardening Infrastructure Devices 175 --
Patching Systems 176 --
Patching Windows Systems 177 --
Patching Linux Systems 179 --
Personal Firewalls 180 --
Windows Firewall 180 --
Netfilter Firewall 187 --
Configuring TCP Wrappers 187 --
Providing Antivirus and Antispyware Protection 188 --
Antivirus Software 189 --
Clam AntiVirus 189 --
Using Online Virus Scanners 196 --
Antispyware Software 196 --
Microsoft Windows Defender 197 --
Microsoft Malicious Software Removal Tool 200 --
Encrypting Sensitive Data 201 --
EFS 202 --
Solutions Fast Track 209 --
Chapter 4 Configuring an Intrusion Detection System 215 --
Intrusion Detection Systems 216 --
Configuring an Intrusion Detection System 217 --
Hardware Requirements 218 --
Placing Your NIDS 218 --
Configuring Snort on a Windows System 221 --
Installing Snort 222 --
Configuring Snort Options 225 --
Using a Snort GUI Front End 231 --
Configuring IDS Policy Manager 232 --
Configuring Snort on a Linux System 240 --
Configuring Snort Options 240 --
Using a GUI Front End for Snort 246 --
Basic Analysis and Security Engine 246 --
Other Snort Add-Ons 254 --
Using Oinkmaster 254 --
Additional Research 256 --
Demonstrating Effectiveness 257 --
Solutions Fast Track 259 --
Chapter 5 Managing Event Logs 263 --
Generating Windows Event Logs 264 --
Using Group Policy to Generate Windows Events Logs 267 --
Generating Custom Windows Event Log Entries 274 --
Collecting Windows Event Logs 275 --
Analyzing Windows Event Logs 277 --
Generating Syslog Event Logs 279 --
Windows Syslog 282 --
Generating Syslog Events 282 --
Receiving Syslog Events 295 --
Linux Syslog 297 --
Generating Syslog Events 297 --
Encrypting Syslog Traffic 298 --
Receiving Syslog Events on a Linux Host 311 --
Analyzing Syslog Logs on Windows and Linux 312 --
Windows Log Analysis 313 --
Linux Log Analysis 321 --
Securing Your Event Logs 327 --
Ensuring Chain of Custody 328 --
Ensuring Log Integrity 329 --
Applying Your Knowledge 331 --
Solutions Fast Track 333 --
Chapter 6 Testing and Auditing Your Systems 337 --
Taking Inventory 338 --
Locating and Identifying Systems 339 --
Nmap 341 --
Super Scanner 347 --
Angry IP Scanner 351 --
Scanline 352 --
Special-Purpose Enumerators 355 --
Locating Wireless Systems 357 --
Network Stumbler 358 --
Documentation 361 --
Network Topology Maps 362 --
Access Request Forms 364 --
Business Continuity and Disaster Recovery Plans 365 --
IT Security Policies/Standards/Procedures 365 --
Vulnerability Scanning 366 --
Nessus 367 --
Running Nessus on Windows 368 --
Running Nessus on Linux 371 --
X-Scan 375 --
Microsoft Baseline Security Analyzer 379 --
OSSTMM 382 --
Solutions Fast Track 386 --
Chapter 7 Network Reporting and Troubleshooting 389 --
Reporting on Bandwidth Usage and Other Metrics 390 --
Collecting Data for Analysis 392 --
Understanding SNMP 394 --
Configuring Multi Router Traffic Grapher 397 --
Configuring MZL & Novatech TrafficStatistic 400 --
Configuring PRTG Traffic Grapher 403 --
Configuring ntop 412 --
Enabling SNMP on Windows Hosts 418 --
Enabling SNMP on Linux Hosts 421 --
Troubleshooting Network Problems 424 --
Using a GUI Sniffer 425 --
Using a Command-Line Sniffer 433 --
Additional Troubleshooting Tools 438 --
Netcat 439 --
Tracetcp 439 --
Netstat 440 --
Solutions Fast Track 442 --
Chapter 8 Security as an Ongoing Process 447 --
Patch Management 448 --
Network Infrastructure Devices 452 --
Operating System Patches 453 --
Application Patches 453 --
Change Management 454 --
Change Causes Disruption 454 --
Inadequate Documentation Can Exacerbate Problems 455 --
Change Management Strategy 455 --
Antivirus 459 --
Antispyware 459 --
Intrusion Detection Systems 460 --
Vulnerability Scanning 460 --
Vulnerability Management Cycle 461 --
Roles and Responsibilities 463 --
Penetration Testing 463 --
Obtaining the Support of Senior Management 464 --
Clarify What You Are Buying 464 --
Policy Review 465 --
Physical Security 466 --
Cert Team 468 --
Solutions Fast Track 470.
Odpovědnost: Eric Seagren.

Recenze

Recenze vložené uživatelem
Nahrávání recenzí GoodReads...
Přebírání recenzí DOGO books...

Štítky

Štítky všech uživatelů (1)

Zobrazit nejoblíbenější štítky jako: seznam štítků | tag cloud

Podobné dokumenty

Související předmětová hesla:(1)

Seznamy uživatele s tímto dokumentem (3)

Potvrdit tento požadavek

Tento dokument jste si již vyžádali. Prosím vyberte Ok pokud chcete přesto v žádance pokračovat.

Propojená data


<http://www.worldcat.org/oclc/77541326>
library:oclcnum"77541326"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:Book
schema:about
schema:about
schema:creator
schema:datePublished"2006"
schema:exampleOfWork<http://worldcat.org/entity/work/id/792606996>
schema:inLanguage"en"
schema:name"Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT"@en
schema:numberOfPages"493"
schema:publication
schema:publisher
schema:publisher
schema:workExample
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA701214>
wdrs:describedby

Content-negotiable representations

Zavřít okno

Prosím přihlaste se do WorldCat 

Nemáte účet? Můžete si jednoduše vytvořit bezplatný účet.