How to Cheat at Configuring Open Source Security Tools

Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty

  • 出版商: Syngress
  • 出版日期: 2007-05-28
  • 售價: $962
  • 語言: 英文
  • 頁數: 528
  • 裝訂: Paperback
  • ISBN: 1597491705
  • ISBN-13: 9781597491709

立即出貨 (庫存=1)

買這商品的人也買了...

商品描述

Description

The perfect book and companion Web site for multi-tasked security professionals and IT managers responsible for securing corporate networks using the 10 most popular tools including: Snort, Nessus, Wireshark, Nmap, and Kismet on Windows, Linux, or Max OS X.
This book is designed to teach readers about the many common vulnerabilities and the ways in which attackers exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers to identify and defend against these attacks using the most commonly deployed open source security tools including Wireshark (sniffer), Snort (IDS), Nessus (Vulnerability Assessment), and Kismet (wireless sniffer). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. The companion Web site for the book contains dozens of working scripts and tools from the book.

*Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools for readers
*Follows Syngress proven How to Cheat pedagogy providing readers with everything they need and nothing they dont