컨텐츠로 이동
Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT 해당 항목을 미리보기
닫기해당 항목을 미리보기
확인중입니다…

Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT

저자: Eric Seagren
출판사: Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2006.
판/형식:   도서 : 영어모든 판과 형식 보기
데이터베이스:WorldCat
요약:

Demonstrates how to get big dollar security for your network using freely available tools. This book explains security principles and then demonstrates how to achieve them using only freely available  더 읽기…

평가:

(아무런 평가가 없습니다.) 0 리뷰와 함께 - 첫번째로 올려주세요.

주제
다음과 같습니다:

 

도서관에서 사본 찾기

&AllPage.SpinnerRetrieving; 해당항목을 보유하고 있는 도서관을 찾는 중

상세정보

문서 형식:
모든 저자 / 참여자: Eric Seagren
ISBN: 9781597491235 1597491233
OCLC 번호: 77541326
설명: xiv, 493 p. ; 23 cm.
내용: Chapter 1 Presenting the Business Case for Free Solutions 1 --
The Costs of Using Free Security Solutions 2 --
Training Costs 3 --
Hardware Costs 3 --
Consulting Costs 4 --
Hidden Costs 5 --
The Savings of Using Free Security Solutions 6 --
Purchase Costs 6 --
Maintenance Costs 7 --
Customization Costs 7 --
Comparing Free Solutions with Commercial Solutions 8 --
Strengths of Free Solutions 9 --
Weaknesses of Free Solutions 10 --
Evaluating Individual Solutions 12 --
"Selling" a Free Solution 16 --
Selling by Doing 17 --
Presenting a Proposal 17 --
Solutions Fast Track 19 --
Chapter 2 Protecting Your Perimeter 23 --
Firewall Types 24 --
Firewall Architectures 27 --
Screened Subnet 27 --
One-Legged 28 --
True DMZ 30 --
Implementing Firewalls 31 --
Hardware versus Software Firewalls 32 --
Configuring netfilter 32 --
Choosing a Linux Version 32 --
Choosing Installation Media 33 --
Linux Firewall Operation 36 --
Configuration Examples 42 --
GUIs 55 --
Smoothwall 76 --
Configuring Windows Firewall 85 --
Providing Secure Remote Access 86 --
Providing VPN Access 87 --
Using Windows as a VPN Concentrator 89 --
iPig 93 --
OpenSSL VPN 98 --
Providing a Remote Desktop 108 --
Windows Terminal Services 109 --
VNC 113 --
Using the X Window System 119 --
Providing a Remote Shell 125 --
Using Secure Shell 126 --
Using a Secure Shell GUI Client 128 --
Solutions Fast Track 131 --
Chapter 3 Protecting Network Resources 133 --
Performing Basic Hardening 134 --
Defining Policy 135 --
Access Controls 137 --
Authentication 137 --
Authorization 138 --
Auditing 138 --
Hardening Windows Systems 139 --
General Hardening Steps 139 --
Users and Groups 142 --
File-Level Access Controls 147 --
Additional Steps 152 --
Using Microsoft Group Policy Objects 153 --
Account Lockout Policy 159 --
Audit Policy 160 --
User Rights Assignment 160 --
Hardening Linux Systems 164 --
General Hardening Steps 164 --
Users and Groups 165 --
File-Level Access Controls 168 --
Using the Bastille Hardening Script 172 --
Using SELinux 173 --
Hardening Infrastructure Devices 175 --
Patching Systems 176 --
Patching Windows Systems 177 --
Patching Linux Systems 179 --
Personal Firewalls 180 --
Windows Firewall 180 --
Netfilter Firewall 187 --
Configuring TCP Wrappers 187 --
Providing Antivirus and Antispyware Protection 188 --
Antivirus Software 189 --
Clam AntiVirus 189 --
Using Online Virus Scanners 196 --
Antispyware Software 196 --
Microsoft Windows Defender 197 --
Microsoft Malicious Software Removal Tool 200 --
Encrypting Sensitive Data 201 --
EFS 202 --
Solutions Fast Track 209 --
Chapter 4 Configuring an Intrusion Detection System 215 --
Intrusion Detection Systems 216 --
Configuring an Intrusion Detection System 217 --
Hardware Requirements 218 --
Placing Your NIDS 218 --
Configuring Snort on a Windows System 221 --
Installing Snort 222 --
Configuring Snort Options 225 --
Using a Snort GUI Front End 231 --
Configuring IDS Policy Manager 232 --
Configuring Snort on a Linux System 240 --
Configuring Snort Options 240 --
Using a GUI Front End for Snort 246 --
Basic Analysis and Security Engine 246 --
Other Snort Add-Ons 254 --
Using Oinkmaster 254 --
Additional Research 256 --
Demonstrating Effectiveness 257 --
Solutions Fast Track 259 --
Chapter 5 Managing Event Logs 263 --
Generating Windows Event Logs 264 --
Using Group Policy to Generate Windows Events Logs 267 --
Generating Custom Windows Event Log Entries 274 --
Collecting Windows Event Logs 275 --
Analyzing Windows Event Logs 277 --
Generating Syslog Event Logs 279 --
Windows Syslog 282 --
Generating Syslog Events 282 --
Receiving Syslog Events 295 --
Linux Syslog 297 --
Generating Syslog Events 297 --
Encrypting Syslog Traffic 298 --
Receiving Syslog Events on a Linux Host 311 --
Analyzing Syslog Logs on Windows and Linux 312 --
Windows Log Analysis 313 --
Linux Log Analysis 321 --
Securing Your Event Logs 327 --
Ensuring Chain of Custody 328 --
Ensuring Log Integrity 329 --
Applying Your Knowledge 331 --
Solutions Fast Track 333 --
Chapter 6 Testing and Auditing Your Systems 337 --
Taking Inventory 338 --
Locating and Identifying Systems 339 --
Nmap 341 --
Super Scanner 347 --
Angry IP Scanner 351 --
Scanline 352 --
Special-Purpose Enumerators 355 --
Locating Wireless Systems 357 --
Network Stumbler 358 --
Documentation 361 --
Network Topology Maps 362 --
Access Request Forms 364 --
Business Continuity and Disaster Recovery Plans 365 --
IT Security Policies/Standards/Procedures 365 --
Vulnerability Scanning 366 --
Nessus 367 --
Running Nessus on Windows 368 --
Running Nessus on Linux 371 --
X-Scan 375 --
Microsoft Baseline Security Analyzer 379 --
OSSTMM 382 --
Solutions Fast Track 386 --
Chapter 7 Network Reporting and Troubleshooting 389 --
Reporting on Bandwidth Usage and Other Metrics 390 --
Collecting Data for Analysis 392 --
Understanding SNMP 394 --
Configuring Multi Router Traffic Grapher 397 --
Configuring MZL & Novatech TrafficStatistic 400 --
Configuring PRTG Traffic Grapher 403 --
Configuring ntop 412 --
Enabling SNMP on Windows Hosts 418 --
Enabling SNMP on Linux Hosts 421 --
Troubleshooting Network Problems 424 --
Using a GUI Sniffer 425 --
Using a Command-Line Sniffer 433 --
Additional Troubleshooting Tools 438 --
Netcat 439 --
Tracetcp 439 --
Netstat 440 --
Solutions Fast Track 442 --
Chapter 8 Security as an Ongoing Process 447 --
Patch Management 448 --
Network Infrastructure Devices 452 --
Operating System Patches 453 --
Application Patches 453 --
Change Management 454 --
Change Causes Disruption 454 --
Inadequate Documentation Can Exacerbate Problems 455 --
Change Management Strategy 455 --
Antivirus 459 --
Antispyware 459 --
Intrusion Detection Systems 460 --
Vulnerability Scanning 460 --
Vulnerability Management Cycle 461 --
Roles and Responsibilities 463 --
Penetration Testing 463 --
Obtaining the Support of Senior Management 464 --
Clarify What You Are Buying 464 --
Policy Review 465 --
Physical Security 466 --
Cert Team 468 --
Solutions Fast Track 470.
책임: Eric Seagren.

리뷰

사용자-기여 리뷰
GoodReads 리뷰 가져오는 중…
DOGObooks 리뷰를 가지고 오는 중…

태그

모든 사용자 태그 (1)

가장 인기있는 태그 보기 태그 리스트 | tag cloud

유사 항목

관련 주제:(1)

이 항목을 가지고 있는 사용자 목록 (3)

요청하신 것을 확인하기

이 항목을 이미 요청하셨을 수도 있습니다. 만약 이 요청을 계속해서 진행하시려면 Ok을 선택하세요.

링크된 데이터


<http://www.worldcat.org/oclc/77541326>
library:oclcnum"77541326"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/77541326>
rdf:typeschema:Book
schema:about
<http://id.loc.gov/authorities/subjects/sh85029513>
rdf:typeschema:Intangible
schema:name"Computer networks--Computer networks--Security measures."@en
schema:about
schema:creator
schema:datePublished"2006"
schema:exampleOfWork<http://worldcat.org/entity/work/id/792606996>
schema:inLanguage"en"
schema:name"Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT"@en
schema:numberOfPages"493"
schema:publisher
schema:publisher
schema:url
schema:workExample
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA701214>

Content-negotiable representations

윈도우 닫기

WorldCat에 로그인 하십시오 

계정이 없으세요? 아주 간단한 절차를 통하여 무료 계정을 만드실 수 있습니다.