• Out-of-Stock
How to Cheat at Configuring Open Source Security Tools
search
  • How to Cheat at Configuring Open Source Security Tools
ID: 172918
Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty
Delivery date unknown
 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide. It is the perfect introduction to the management of freely available, and powerful, Open Source tools. Learn how to test and audit your systems using Snort and Wireshark. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.

* Take Inventory
. See also the inventory of animals in your inventory.
* Use Nmap
Learn how Nmap has more features and options than any other scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.
* Perform Basic Hardening
Put an IT security policy in the place so that you have a concrete set.
* Install and Configure Snort and Wireshark
Explore the feature of these powerful tools, as well as their pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep. Snort signature files. Current.
* Troubleshoot Network Problems
See how to report on bandwidth and other methods, such as sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor it on your network.

* Covers the top 10 popular bridge open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
* Companion Web site contains dozens of working scripts and tools for readers
* Follows Syngress' proven 'How to Cheat' pedagogy providing readers with everything they need and do not

Presenting the Business Case for Free Solutions
Protecting Your Perimeter
Protecting Network Resources
Deploying Snort
Wireshark deploying
Deploying Nessus
Securing your Wireless Network
Using Penetration Testing Tools
Reporting and Analysis
172918

Other products in the same category (16)