w infk01 - Open Source Security Tools, Książki IT

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • lilyth.htw.pl
  • Podobne

     

    w infk01 - Open Source Security Tools, Książki IT

    [ Pobierz całość w formacie PDF ]
    howlett_fm.fm Page i Tuesday, June 29, 2004 2:10 PM
    Open Source
    Security Tools
     howlett_fm.fm Page ii Tuesday, June 29, 2004 2:10 PM
    B
    RUCE
    P
    ERENS
    ’ O
    PEN
    S
    OURCE
    S
    ERIES
    http://www.phptr.com/perens
    C++ GUI Programming with Qt 3
    Jasmin Blanchette, Mark Summerfield

    Managing Linux Systems with Webmin: System Administration and
    Module Development
    Jamie Cameron

    Understanding the Linux Virtual Memory Manager
    Mel Gorman

    Implementing CIFS: The Common Internet File System
    Christopher Hertel

    Embedded Software Development with eCos
    Anthony Massa

    Rapid Application Development with Mozilla
    Nigel McFarlane

    The Linux Development Platform: Configuring, Using, and Maintaining a
    Complete Programming Environment
    Rafeeq Ur Rehman, Christopher Paul

    Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT,
    Apache, MySQL, PHP, and ACID
    Rafeeq Ur Rehman

    The Official Samba-3 HOWTO and Reference Guide
    John H. Terpstra, Jelmer R. Vernooij, Editors

    Samba-3 by Example: Practical Exercises to Successful Deployment
    John H. Terpstra

     howlett_fm.fm Page iii Tuesday, June 29, 2004 2:10 PM
    Open Source
    Security Tools
    Practical Applications for Security
    Tony Howlett
    Prentice Hall
    Professional Technical Reference
    Upper Saddle River, NJ 07458
    www.phptr.com
     howlett_fm.fm Page iv Wednesday, June 30, 2004 9:51 AM
    Visit Prentice Hall on the Web: www.phptr.com
    Library of Congress Cataloging-in-Publication Data
    Howlett, Tony.
    Open source security tools : practical applications for security / Tony Howlett
    p. cm.
    Includes index.
    ISBN 0-321-19443-8 (pbk. : alk. paper)
    1. Computer security. 2. Computer networks—Security measures. 3. Open source software. I. Title.
    QA76.9.A25H6985 2004
    005.8—dc22
    2004009479
    Copyright © 2005 Pearson Education, Inc.
    Publishing as Prentice Hall Professional Technical Reference
    Upper Saddle River, New Jersey 07458
    Prentice Hall PTR offers excellent discounts on this book when ordered in quantity for bulk purchases or special
    sales. For more information, please contact: U.S. Corporate and Government Sales, 1-800-382-3419, corp-
    sales@pearsontechgroup.com. For sales outside of the U.S., please contact: International Sales,
    1-317-581-3793, international@pearsontechgroup.com.
    Company and product names mentioned herein are the trademarks or registered trademarks of their respective
    owners.
    This material may be distributed only subject to the terms and conditions set forth in the Open Publication
    License, v.1.0 or later. The latest version is presently available at www.opencontent.org/openpub/.
    Printed in the United States of America
    First Printing, July 2004
    ISBN 0-321-19443-8
    Pearson Education Ltd.
    Pearson Education Australia Pty., Limited
    Pearson Education South Asia Pte. Ltd.
    Pearson Education Asia Ltd.
    Pearson Education Canada, Ltd.
    Pearson Educación de Mexico, S.A. de C.V.
    Pearson Education—Japan
    Pearson Malaysia S.D.N. B.H.D.
     HowlettTOC.fm Page v Tuesday, June 29, 2004 2:33 PM
    Contents
    Preface xi
    Audience xii
    Contents xii
    Open Source Security Tool
    Index xiii
    Chapter 1: Information Security
    and Open Source Software
    1
    Information Security and Open
    Source Software 1
    Securing the Perimeter
    1
    Plugging the Holes 2
    Establishing an Early Warning
    System 2
    Building a Management System
    for Security Data 2
    Implementing a Secure Wireless
    Solution 3
    Securing Important Files and
    Communications 3
    Investigating Break-ins
    xiii
    Chapter 2: Operating System
    Tools xiii
    Chapter 3: Firewalls xiii
    Chapter 4: Port Scanners
    xiii
    Chapter 5: Vulnerability
    Scanners xiv
    Chapter 6: Network Sniffers xiv
    Chapter 7: Intrusion Detection
    Systems xiv
    Chapter 8: Analysis and
    Management Tools xiv
    Chapter 9: Encryption Tools
    3
    The Practice of Information
    Security 4
    Confidentiality
    4
    Integrity 5
    Availability 5
    The State of Computer Crime
    xiv
    5
    Chapter 10: Wireless Tools
    xiv
    The Advent of the Internet
    7
    Chapter 11: Forensic Tools
    xiv
    Ubiquitous, Inexpensive
    Broadband 7
    Attack of the Script Kiddies 8
    Worms, Auto-rooters, and Other
    Malware 9
    Info-Security Business Risks
    Chapter 12: More On Open
    Source Software xv
    Appendix A: Common Open
    Source Licenses xv
    Appendix B: Basic Linux/UNIX
    Commands xv
    Appendix C: Well-Known TCP/IP
    Port Numbers xv
    Appendix D: General Permission
    and Waiver Form
    9
    Data Loss 9
    Denial of Service 10
    Embarrassment/Loss of
    Customers
    10
    xv
    Liability 10
    Disclosure of Corporate Secrets
    and Data 11
    Tampering with Records
    Appendix E: Nessus
    Plug-ins xv
    CD-ROM Contents and
    Organization xv
    Using the Tools xvi
    Reference Installation
    12
    Loss of Productivity
    12
    Open Source History 13
    Linux Enters the Scene
    xvi
    14
    Input Variables xvi
    Acknowledgements
    Open Source Advantages
    15
    xvii
    Cost 15
    Extendability
    15
    Tools Index
    xix
    v
       [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • mement.xlx.pl
  • Designed by Finerdesign.com