Flylib.com
Open Source Security Tools. Securing Your Unix or Windows Systems
Open Source Security Tools. Securing Your Unix or Windows Systems
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 99
BUY ON AMAZON
Open Source Security Tools: A Practical Guide to Security Applications
Table of Contents
Copyright
Bruce Perens Open Source Series
Preface
Audience
Contents
CD-ROM Contents and Organization
Acknowledgments
Open Source Security Tools Index
Chapter 1. Information Security and Open Source Software
Securing the Perimeter
Plugging the Holes
Establishing an Early Warning System
Building a Management System for Security Data
Implementing a Secure Wireless Solution
Securing Important Files and Communications
Investigating Break-ins
The Practice of Information Security
The State of Computer Crime
Info-Security Business Risks
Open Source History
Open Source Advantages
When Open Source May Not Fit Your Needs
Windows and Open Source
Open Source Licenses
Chapter 2. Operating System Tools
Hardening Your Security Tool System
traceroute (UNIX) or tracert (Windows): Network Diagnostic Tools
Considerations for Hardening Windows
Chapter 3. Firewalls
Network Architecture Basics
TCPIP Networking
Security Business Processes
SmoothWall Hardware Requirements
SmoothWall Express Versus SmoothWall Corporate
Installing SmoothWall
Administering the SmoothWall Firewall
Creating a VPN on the SmoothWall Firewall
Windows-Based Firewalls
Chapter 4. Port Scanners
Overview of Port Scanners
Considerations for Port Scanning
Uses for Port Scanners
Chapter 5. Vulnerability Scanners
Identifying Security Holes in Your Systems
Vulnerability Scanners to the Rescue
Considerations for Vulnerability Scanning
What Vulnerability Testing Doesn t Find
Chapter 6. Network Sniffers
A Brief History of Ethernet
Considerations for Network Sniffing
TCPIP Packet Headers
Chapter 7. Intrusion Detection Systems
NIDS Signature Examples
The Problem of NIDS False Positives
Getting the Most Out of Your IDS
Configuring Snort for Maximum Performance
Host-Based Intrusion Detection
Chapter 8. Analysis and Management Tools
Installing Swatch
Configuring and Running Swatch
The Swatch Configuration File
Using Databases and Web Servers to Manage Your Security Data
The Birth of an Open Source Project
Chapter 9. Encryption Tools
Types of Encryption
Virtual Private Networks
Chapter 10. Wireless Tools
Wireless LAN Technology Overview
Dangers of Wireless LANs
The
Performing a Wireless Network Security Assessment
Steps for More Secure Wireless LANs
Chapter 11. Forensic Tools
Uses for Computer Forensic Tools
Building an Incident Response Plan
Preparing for Good Forensic Data
Where to Look for Forensic Data
Tenets of Good Forensic Analysis
Forensic Analysis Tools
Reviewing Log Files
Making Copies of Forensic Evidence
Chapter 12. More on Open Source Software
Open Source Resources
Joining the Open Source Movement
More Open Source Security Tools
Appendix A. Open Source Licenses
The GNU General Public License (GPL)
The BSD Open Source License
Appendix B. Basic LinuxUNIX Commands
Appendix C. Well-Known TCPIP Port Numbers
Appendix D. General Permission and Waiver Form
Port Scanning and Vulnerability Testing
Appendix E. Nessus Plug-ins
References
Web Sites
Books and Articles
Open Source Security Tools. Securing Your Unix or Windows Systems
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 99
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Linux and Automated Security Assessment Tools
Apply Your Knowledge
Buffer Overflows
Protocols, Standards, and Applications
Trojans and Backdoors
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Wide Area Network (WAN) Technologies
Internet Group Management Protocol (IGMP)
User Datagram Protocol
Transmission Control Protocol (TCP) Retransmission and Time-Out
Virtual Private Networks (VPNs)
C++ How to Program (5th Edition)
Overloading ++ and --
Summary
Wrap-Up
Associative Containers
Terminology
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
The Internationalization of the Retail Supply Chain
Fashion Logistics and Quick Response
Transforming Technologies: Retail Exchanges and RFID
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Seeing Services Through Your Customers Eyes-Becoming a customer-centered organization
Success Story #2 Bank One Bigger… Now Better
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Using DMAIC to Improve Service Processes
First Wave Service Projects
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies