Open Source Security Tools: Practical Guide to Security Applications

Open Source Security Tools: Practical Guide to Security Applications

A practical, hands-on introduction to open source security tools.

Publication date: 01 Aug 2004

ISBN-10: 0321194438

ISBN-13: n/a

Paperback: 608 pages

Views: 26,007

Type: Book

Publisher: Prentice Hall

License: n/a

Post time: 15 Oct 2008 08:37:09

Open Source Security Tools: Practical Guide to Security Applications

Open Source Security Tools: Practical Guide to Security Applications A practical, hands-on introduction to open source security tools.
Tag(s): Computer Security System Administration
Publication date: 01 Aug 2004
ISBN-10: 0321194438
ISBN-13: n/a
Paperback: 608 pages
Views: 26,007
Document Type: Book
Publisher: Prentice Hall
License: n/a
Post time: 15 Oct 2008 08:37:09
Excerpts from the book description:

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. Author Tony Howlett has reviewed assortment of these free and low-cost solutions to provide reader with the "best of breed" for all major areas of information security.

Inside, reader will find everything from how to harden Linux and Windows systems to how to investigate breaches with Sleuth Kit, Autopsy Forensic Browser, and Forensic Tool Kit. For each security task described, the author reviews the best open source tools and how to use them and also provides a case study and sample implementation. Covered tasks include:

* Installing an open source firewall using Ipchains, Iptables, Turtle firewall, or Smoothwall
* Scanning ports and testing for vulnerabilities using Nmap, Nlog, Nmap for Windows, Nessus,and NessusWX
* Using sniffers and network-intrusion systems, including Tcpdump, Ethereal, Windump, Snort™, and Snort™ for Windows
* Tracking and analyzing collected data with Swatch, ACID, and NCC
* Encrypting communications with PGP, GnuPG, SSH, and Free S/WAN

This reference also tackles wireless security and covers tools such as Kismet Wireless, Airsnort, and Netstumbler.
 




About The Author(s)


No information is available for this author.

Tony Howlett

No information is available for this author.


Book Categories
Sponsors