aller au contenu
Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT Aperçu de cet ouvrage
FermerAperçu de cet ouvrage
Vérifiant…

Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT

Auteur : Eric Seagren
Éditeur : Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2006.
Édition/format :   Livre : AnglaisVoir toutes les éditions et les formats
Base de données :WorldCat
Résumé :

Demonstrates how to get big dollar security for your network using freely available tools. This book explains security principles and then demonstrates how to achieve them using only freely available  Lire la suite...

Évaluation :

(pas encore évalué) 0 avec des critiques - Soyez le premier.

Sujets
Plus comme ceci

 

Trouver un exemplaire dans la bibliothèque

&AllPage.SpinnerRetrieving; Recherche de bibliothèques qui possèdent cet ouvrage...

Détails

Format : Livre
Tous les auteurs / collaborateurs : Eric Seagren
ISBN : 9781597491235 1597491233
Numéro OCLC : 77541326
Description : xiv, 493 p. ; 23 cm.
Contenu : Chapter 1 Presenting the Business Case for Free Solutions 1 --
The Costs of Using Free Security Solutions 2 --
Training Costs 3 --
Hardware Costs 3 --
Consulting Costs 4 --
Hidden Costs 5 --
The Savings of Using Free Security Solutions 6 --
Purchase Costs 6 --
Maintenance Costs 7 --
Customization Costs 7 --
Comparing Free Solutions with Commercial Solutions 8 --
Strengths of Free Solutions 9 --
Weaknesses of Free Solutions 10 --
Evaluating Individual Solutions 12 --
"Selling" a Free Solution 16 --
Selling by Doing 17 --
Presenting a Proposal 17 --
Solutions Fast Track 19 --
Chapter 2 Protecting Your Perimeter 23 --
Firewall Types 24 --
Firewall Architectures 27 --
Screened Subnet 27 --
One-Legged 28 --
True DMZ 30 --
Implementing Firewalls 31 --
Hardware versus Software Firewalls 32 --
Configuring netfilter 32 --
Choosing a Linux Version 32 --
Choosing Installation Media 33 --
Linux Firewall Operation 36 --
Configuration Examples 42 --
GUIs 55 --
Smoothwall 76 --
Configuring Windows Firewall 85 --
Providing Secure Remote Access 86 --
Providing VPN Access 87 --
Using Windows as a VPN Concentrator 89 --
iPig 93 --
OpenSSL VPN 98 --
Providing a Remote Desktop 108 --
Windows Terminal Services 109 --
VNC 113 --
Using the X Window System 119 --
Providing a Remote Shell 125 --
Using Secure Shell 126 --
Using a Secure Shell GUI Client 128 --
Solutions Fast Track 131 --
Chapter 3 Protecting Network Resources 133 --
Performing Basic Hardening 134 --
Defining Policy 135 --
Access Controls 137 --
Authentication 137 --
Authorization 138 --
Auditing 138 --
Hardening Windows Systems 139 --
General Hardening Steps 139 --
Users and Groups 142 --
File-Level Access Controls 147 --
Additional Steps 152 --
Using Microsoft Group Policy Objects 153 --
Account Lockout Policy 159 --
Audit Policy 160 --
User Rights Assignment 160 --
Hardening Linux Systems 164 --
General Hardening Steps 164 --
Users and Groups 165 --
File-Level Access Controls 168 --
Using the Bastille Hardening Script 172 --
Using SELinux 173 --
Hardening Infrastructure Devices 175 --
Patching Systems 176 --
Patching Windows Systems 177 --
Patching Linux Systems 179 --
Personal Firewalls 180 --
Windows Firewall 180 --
Netfilter Firewall 187 --
Configuring TCP Wrappers 187 --
Providing Antivirus and Antispyware Protection 188 --
Antivirus Software 189 --
Clam AntiVirus 189 --
Using Online Virus Scanners 196 --
Antispyware Software 196 --
Microsoft Windows Defender 197 --
Microsoft Malicious Software Removal Tool 200 --
Encrypting Sensitive Data 201 --
EFS 202 --
Solutions Fast Track 209 --
Chapter 4 Configuring an Intrusion Detection System 215 --
Intrusion Detection Systems 216 --
Configuring an Intrusion Detection System 217 --
Hardware Requirements 218 --
Placing Your NIDS 218 --
Configuring Snort on a Windows System 221 --
Installing Snort 222 --
Configuring Snort Options 225 --
Using a Snort GUI Front End 231 --
Configuring IDS Policy Manager 232 --
Configuring Snort on a Linux System 240 --
Configuring Snort Options 240 --
Using a GUI Front End for Snort 246 --
Basic Analysis and Security Engine 246 --
Other Snort Add-Ons 254 --
Using Oinkmaster 254 --
Additional Research 256 --
Demonstrating Effectiveness 257 --
Solutions Fast Track 259 --
Chapter 5 Managing Event Logs 263 --
Generating Windows Event Logs 264 --
Using Group Policy to Generate Windows Events Logs 267 --
Generating Custom Windows Event Log Entries 274 --
Collecting Windows Event Logs 275 --
Analyzing Windows Event Logs 277 --
Generating Syslog Event Logs 279 --
Windows Syslog 282 --
Generating Syslog Events 282 --
Receiving Syslog Events 295 --
Linux Syslog 297 --
Generating Syslog Events 297 --
Encrypting Syslog Traffic 298 --
Receiving Syslog Events on a Linux Host 311 --
Analyzing Syslog Logs on Windows and Linux 312 --
Windows Log Analysis 313 --
Linux Log Analysis 321 --
Securing Your Event Logs 327 --
Ensuring Chain of Custody 328 --
Ensuring Log Integrity 329 --
Applying Your Knowledge 331 --
Solutions Fast Track 333 --
Chapter 6 Testing and Auditing Your Systems 337 --
Taking Inventory 338 --
Locating and Identifying Systems 339 --
Nmap 341 --
Super Scanner 347 --
Angry IP Scanner 351 --
Scanline 352 --
Special-Purpose Enumerators 355 --
Locating Wireless Systems 357 --
Network Stumbler 358 --
Documentation 361 --
Network Topology Maps 362 --
Access Request Forms 364 --
Business Continuity and Disaster Recovery Plans 365 --
IT Security Policies/Standards/Procedures 365 --
Vulnerability Scanning 366 --
Nessus 367 --
Running Nessus on Windows 368 --
Running Nessus on Linux 371 --
X-Scan 375 --
Microsoft Baseline Security Analyzer 379 --
OSSTMM 382 --
Solutions Fast Track 386 --
Chapter 7 Network Reporting and Troubleshooting 389 --
Reporting on Bandwidth Usage and Other Metrics 390 --
Collecting Data for Analysis 392 --
Understanding SNMP 394 --
Configuring Multi Router Traffic Grapher 397 --
Configuring MZL & Novatech TrafficStatistic 400 --
Configuring PRTG Traffic Grapher 403 --
Configuring ntop 412 --
Enabling SNMP on Windows Hosts 418 --
Enabling SNMP on Linux Hosts 421 --
Troubleshooting Network Problems 424 --
Using a GUI Sniffer 425 --
Using a Command-Line Sniffer 433 --
Additional Troubleshooting Tools 438 --
Netcat 439 --
Tracetcp 439 --
Netstat 440 --
Solutions Fast Track 442 --
Chapter 8 Security as an Ongoing Process 447 --
Patch Management 448 --
Network Infrastructure Devices 452 --
Operating System Patches 453 --
Application Patches 453 --
Change Management 454 --
Change Causes Disruption 454 --
Inadequate Documentation Can Exacerbate Problems 455 --
Change Management Strategy 455 --
Antivirus 459 --
Antispyware 459 --
Intrusion Detection Systems 460 --
Vulnerability Scanning 460 --
Vulnerability Management Cycle 461 --
Roles and Responsibilities 463 --
Penetration Testing 463 --
Obtaining the Support of Senior Management 464 --
Clarify What You Are Buying 464 --
Policy Review 465 --
Physical Security 466 --
Cert Team 468 --
Solutions Fast Track 470.
Responsabilité : Eric Seagren.

Critiques

Critiques d’utilisateurs
Récupération des critiques de GoodReads...
Récuperation des critiques DOGObooks…

Tags

Tous les tags des utilisateurs (1)

Voir les tags les plus utilisés sous forme de : liste de tags | nuage de tags

Ouvrages semblables

Sujets associés :(1)

Listes d’utilisateurs dans lesquelles cet ouvrage apparaît (3)

Confirmez cette demande

Vous avez peut-être déjà demandé cet ouvrage. Veuillez sélectionner OK si vous voulez poursuivre avec cette demande quand même.

Données liées


<http://www.worldcat.org/oclc/77541326>
library:oclcnum"77541326"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/77541326>
rdf:typeschema:Book
schema:about
<http://id.loc.gov/authorities/subjects/sh85029513>
rdf:typeschema:Intangible
schema:name"Computer networks--Computer networks--Security measures."@en
schema:about
schema:creator
schema:datePublished"2006"
schema:exampleOfWork<http://worldcat.org/entity/work/id/792606996>
schema:inLanguage"en"
schema:name"Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT"@en
schema:numberOfPages"493"
schema:publisher
schema:publisher
schema:url
schema:workExample
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA701214>

Content-negotiable representations

Fermer la fenêtre

Veuillez vous identifier dans WorldCat 

Vous n’avez pas de compte? Vous pouvez facilement créer un compte gratuit.