logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

How To Cheat At Configuring Open Source Security Tools Michael Gregg

  • SKU: BELL-1286694
How To Cheat At Configuring Open Source Security Tools Michael Gregg
$ 31.00 $ 45.00 (-31%)

4.7

56 reviews

How To Cheat At Configuring Open Source Security Tools Michael Gregg instant download after payment.

Publisher: Syngress; Elsevier Science [distributor]
File Extension: PDF
File size: 7.64 MB
Pages: 530
Author: Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty
ISBN: 9780080553566, 9781597491709, 1597491705, 0080553567
Language: English
Year: 2007

Product desciption

How To Cheat At Configuring Open Source Security Tools Michael Gregg by Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty 9780080553566, 9781597491709, 1597491705, 0080553567 instant download after payment.

The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. *Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet *Companion Web site contains dozens of working scripts and tools for readers *Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't

Related Products