Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Open Source Security Tools: A Practical Guide to Security Applications
网址居 (LinkBasket) - 中英文世界消息尽在此处!.
  • Title Open Source Security Tools: A Practical Guide to Security Applications
  • Author(s) Tony Howlett
  • Publisher: Prentice Hall (August 8, 2004), Pearson Education, Inc (2005)
  • License(s): Open Publication License
  • Hardcover 608 pages
  • eBook PDF, 9.75 MB
  • Language: English
  • ASIN: 0321194438
  • ISBN-13: 978-0321194435
  • Share This:  

Book Description

This book is a practical, hands-on introduction to open source security tools.

Inside, you'll find everything from how to harden Linux and Windows systems to how to investigate breaches with Sleuth Kit, Autopsy Forensic Browser, and Forensic Tool Kit. For each security task described, the author reviews the best open source tools and how to use them and also provides a case study and sample implementation. Covered tasks include:

  • Installing an open source firewall using Ipchains, Iptables, Turtle firewall, or Smoothwall
  • Scanning ports and testing for vulnerabilities using Nmap, Nlog, Nmap for Windows, Nessus,and NessusWX
  • Using sniffers and network-intrusion systems, including Tcpdump, Ethereal, Windump, Snort, and Snort for Windows
  • Tracking and analyzing collected data with Swatch, ACID, and NCC
  • Encrypting communications with PGP, GnuPG, SSH, and Free S/WAN
This handy reference also tackles the emerging field of wireless security and covers tools such as Kismet Wireless, Airsnort, and Netstumber.

Whether you're a Windows system administrator or a network administrator, you will come away with an understanding of how open source security tools can help protect your organization and further your own career.

About the Authors
  • Tony Howlett is the president of Network Security Services, a computer-security application service provider built entirely on open source software.
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Rational Cybersecurity for Business (Daniel Blum)

    This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience.

  • Security of Ubiquitous Computing Systems (Gildas Avoine, et al)

    It is to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework that lies along four axes: cryptographic models, cryptanalysis of building blocks, security engineering, and security assessment.

  • Computer Security Handbook (Seymour Bosworth, et al.)

    This handbook has compiled advice about how to minimize the possibility of computer security breaches in your systems. It provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more.

  • Handbook of Information Security Management (Micki Krause)

    Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

  • Network Security Tools: Writing, Hacking, and Modifying Security

    This concise, high-end free book discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment.

  • Security+ Essentials (Neil Smyth)

    This book is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ examination. It is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.

  • Beautiful Security: Leading Security Experts Explain How They Think

    This book features a collection of essays and insightful analyses by leaders who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security, and much more.

Book Categories
:
Other Categories
Resources and Links