컨텐츠로 이동
Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT 해당 항목을 미리보기
닫기해당 항목을 미리보기
확인중입니다…

Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT

저자: Eric Seagren
출판사: Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2006.
판/형식:   Print book : 영어모든 판과 형식 보기
데이터베이스:WorldCat
요약:

Demonstrates how to get big dollar security for your network using freely available tools. This book explains security principles and then demonstrates how to achieve them using only freely available  더 읽기…

평가:

(아무런 평가가 없습니다.) 0 리뷰와 함께 - 첫번째로 올려주세요.

주제
다음과 같습니다:

 

도서관에서 사본 찾기

&AllPage.SpinnerRetrieving; 해당항목을 보유하고 있는 도서관을 찾는 중

상세정보

문서 형식:
모든 저자 / 참여자: Eric Seagren
ISBN: 9781597491235 1597491233
OCLC 번호: 77541326
설명: xiv, 493 pages ; 23 cm
내용: Chapter 1 Presenting the Business Case for Free Solutions 1 --
The Costs of Using Free Security Solutions 2 --
Training Costs 3 --
Hardware Costs 3 --
Consulting Costs 4 --
Hidden Costs 5 --
The Savings of Using Free Security Solutions 6 --
Purchase Costs 6 --
Maintenance Costs 7 --
Customization Costs 7 --
Comparing Free Solutions with Commercial Solutions 8 --
Strengths of Free Solutions 9 --
Weaknesses of Free Solutions 10 --
Evaluating Individual Solutions 12 --
"Selling" a Free Solution 16 --
Selling by Doing 17 --
Presenting a Proposal 17 --
Solutions Fast Track 19 --
Chapter 2 Protecting Your Perimeter 23 --
Firewall Types 24 --
Firewall Architectures 27 --
Screened Subnet 27 --
One-Legged 28 --
True DMZ 30 --
Implementing Firewalls 31 --
Hardware versus Software Firewalls 32 --
Configuring netfilter 32 --
Choosing a Linux Version 32 --
Choosing Installation Media 33 --
Linux Firewall Operation 36 --
Configuration Examples 42 --
GUIs 55 --
Smoothwall 76 --
Configuring Windows Firewall 85 --
Providing Secure Remote Access 86 --
Providing VPN Access 87 --
Using Windows as a VPN Concentrator 89 --
iPig 93 --
OpenSSL VPN 98 --
Providing a Remote Desktop 108 --
Windows Terminal Services 109 --
VNC 113 --
Using the X Window System 119 --
Providing a Remote Shell 125 --
Using Secure Shell 126 --
Using a Secure Shell GUI Client 128 --
Solutions Fast Track 131 --
Chapter 3 Protecting Network Resources 133 --
Performing Basic Hardening 134 --
Defining Policy 135 --
Access Controls 137 --
Authentication 137 --
Authorization 138 --
Auditing 138 --
Hardening Windows Systems 139 --
General Hardening Steps 139 --
Users and Groups 142 --
File-Level Access Controls 147 --
Additional Steps 152 --
Using Microsoft Group Policy Objects 153 --
Account Lockout Policy 159 --
Audit Policy 160 --
User Rights Assignment 160 --
Hardening Linux Systems 164 --
General Hardening Steps 164 --
Users and Groups 165 --
File-Level Access Controls 168 --
Using the Bastille Hardening Script 172 --
Using SELinux 173 --
Hardening Infrastructure Devices 175 --
Patching Systems 176 --
Patching Windows Systems 177 --
Patching Linux Systems 179 --
Personal Firewalls 180 --
Windows Firewall 180 --
Netfilter Firewall 187 --
Configuring TCP Wrappers 187 --
Providing Antivirus and Antispyware Protection 188 --
Antivirus Software 189 --
Clam AntiVirus 189 --
Using Online Virus Scanners 196 --
Antispyware Software 196 --
Microsoft Windows Defender 197 --
Microsoft Malicious Software Removal Tool 200 --
Encrypting Sensitive Data 201 --
EFS 202 --
Solutions Fast Track 209 --
Chapter 4 Configuring an Intrusion Detection System 215 --
Intrusion Detection Systems 216 --
Configuring an Intrusion Detection System 217 --
Hardware Requirements 218 --
Placing Your NIDS 218 --
Configuring Snort on a Windows System 221 --
Installing Snort 222 --
Configuring Snort Options 225 --
Using a Snort GUI Front End 231 --
Configuring IDS Policy Manager 232 --
Configuring Snort on a Linux System 240 --
Configuring Snort Options 240 --
Using a GUI Front End for Snort 246 --
Basic Analysis and Security Engine 246 --
Other Snort Add-Ons 254 --
Using Oinkmaster 254 --
Additional Research 256 --
Demonstrating Effectiveness 257 --
Solutions Fast Track 259 --
Chapter 5 Managing Event Logs 263 --
Generating Windows Event Logs 264 --
Using Group Policy to Generate Windows Events Logs 267 --
Generating Custom Windows Event Log Entries 274 --
Collecting Windows Event Logs 275 --
Analyzing Windows Event Logs 277 --
Generating Syslog Event Logs 279 --
Windows Syslog 282 --
Generating Syslog Events 282 --
Receiving Syslog Events 295 --
Linux Syslog 297 --
Generating Syslog Events 297 --
Encrypting Syslog Traffic 298 --
Receiving Syslog Events on a Linux Host 311 --
Analyzing Syslog Logs on Windows and Linux 312 --
Windows Log Analysis 313 --
Linux Log Analysis 321 --
Securing Your Event Logs 327 --
Ensuring Chain of Custody 328 --
Ensuring Log Integrity 329 --
Applying Your Knowledge 331 --
Solutions Fast Track 333 --
Chapter 6 Testing and Auditing Your Systems 337 --
Taking Inventory 338 --
Locating and Identifying Systems 339 --
Nmap 341 --
Super Scanner 347 --
Angry IP Scanner 351 --
Scanline 352 --
Special-Purpose Enumerators 355 --
Locating Wireless Systems 357 --
Network Stumbler 358 --
Documentation 361 --
Network Topology Maps 362 --
Access Request Forms 364 --
Business Continuity and Disaster Recovery Plans 365 --
IT Security Policies/Standards/Procedures 365 --
Vulnerability Scanning 366 --
Nessus 367 --
Running Nessus on Windows 368 --
Running Nessus on Linux 371 --
X-Scan 375 --
Microsoft Baseline Security Analyzer 379 --
OSSTMM 382 --
Solutions Fast Track 386 --
Chapter 7 Network Reporting and Troubleshooting 389 --
Reporting on Bandwidth Usage and Other Metrics 390 --
Collecting Data for Analysis 392 --
Understanding SNMP 394 --
Configuring Multi Router Traffic Grapher 397 --
Configuring MZL & Novatech TrafficStatistic 400 --
Configuring PRTG Traffic Grapher 403 --
Configuring ntop 412 --
Enabling SNMP on Windows Hosts 418 --
Enabling SNMP on Linux Hosts 421 --
Troubleshooting Network Problems 424 --
Using a GUI Sniffer 425 --
Using a Command-Line Sniffer 433 --
Additional Troubleshooting Tools 438 --
Netcat 439 --
Tracetcp 439 --
Netstat 440 --
Solutions Fast Track 442 --
Chapter 8 Security as an Ongoing Process 447 --
Patch Management 448 --
Network Infrastructure Devices 452 --
Operating System Patches 453 --
Application Patches 453 --
Change Management 454 --
Change Causes Disruption 454 --
Inadequate Documentation Can Exacerbate Problems 455 --
Change Management Strategy 455 --
Antivirus 459 --
Antispyware 459 --
Intrusion Detection Systems 460 --
Vulnerability Scanning 460 --
Vulnerability Management Cycle 461 --
Roles and Responsibilities 463 --
Penetration Testing 463 --
Obtaining the Support of Senior Management 464 --
Clarify What You Are Buying 464 --
Policy Review 465 --
Physical Security 466 --
Cert Team 468 --
Solutions Fast Track 470.
책임: Eric Seagren.

리뷰

사용자-기여 리뷰
GoodReads 리뷰 가져오는 중…
DOGObooks 리뷰를 가지고 오는 중…

태그

첫번째 되기

유사 항목

관련 주제:(1)

이 항목을 가지고 있는 사용자 목록 (3)

요청하신 것을 확인하기

이 항목을 이미 요청하셨을 수도 있습니다. 만약 이 요청을 계속해서 진행하시려면 Ok을 선택하세요.

링크된 데이터


Primary Entity

<http://www.worldcat.org/oclc/77541326> # Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "77541326" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/792606996#Place/rockland_mass> ; # Rockland, Mass.
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/792606996#Place/oxford> ; # Oxford
   schema:about <http://experiment.worldcat.org/entity/work/data/792606996#Topic/computer_networks_computer_networks_security_measures> ; # Computer networks--Computer networks--Security measures
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:bookFormat bgn:PrintBook ;
   schema:creator <http://viaf.org/viaf/120561751> ; # Eric Seagren
   schema:datePublished "2006" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/792606996> ;
   schema:inLanguage "en" ;
   schema:name "Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT"@en ;
   schema:productID "77541326" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/77541326#PublicationEvent/rockland_mass_syngress_oxford_elsevier_science_distributor_2006> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/792606996#Agent/syngress> ; # Syngress
   schema:publisher <http://experiment.worldcat.org/entity/work/data/792606996#Agent/elsevier_science_distributor> ; # Elsevier Science [distributor]
   schema:workExample <http://worldcat.org/isbn/9781597491235> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA701214> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/77541326> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/792606996#Agent/elsevier_science_distributor> # Elsevier Science [distributor]
    a bgn:Agent ;
   schema:name "Elsevier Science [distributor]" ;
    .

<http://experiment.worldcat.org/entity/work/data/792606996#Place/rockland_mass> # Rockland, Mass.
    a schema:Place ;
   schema:name "Rockland, Mass." ;
    .

<http://experiment.worldcat.org/entity/work/data/792606996#Topic/computer_networks_computer_networks_security_measures> # Computer networks--Computer networks--Security measures
    a schema:Intangible ;
   schema:hasPart <http://id.loc.gov/authorities/subjects/sh85029513> ;
   schema:name "Computer networks--Computer networks--Security measures"@en ;
    .

<http://viaf.org/viaf/120561751> # Eric Seagren
    a schema:Person ;
   schema:familyName "Seagren" ;
   schema:givenName "Eric" ;
   schema:name "Eric Seagren" ;
    .

<http://worldcat.org/isbn/9781597491235>
    a schema:ProductModel ;
   schema:isbn "1597491233" ;
   schema:isbn "9781597491235" ;
    .


Content-negotiable representations

윈도우 닫기

WorldCat에 로그인 하십시오 

계정이 없으세요? 아주 간단한 절차를 통하여 무료 계정을 만드실 수 있습니다.