Gespeichert in:
Beteiligte Personen: | , , , , |
---|---|
Körperschaften: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Syngress
2011
|
Ausgabe: | 1st edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780080553566/?ar |
Zusammenfassung: | The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't. |
Beschreibung: | Online resource; Title from title page (viewed April 18, 2011) |
Umfang: | 1 Online-Ressource (528 pages) |
ISBN: | 9780080553566 0080553567 1281060275 9781281060273 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-053532317 | ||
003 | DE-627-1 | ||
005 | 20240228121229.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200625s2011 xx |||||o 00| ||eng c | ||
020 | |a 9780080553566 |9 978-0-08-055356-6 | ||
020 | |a 0080553567 |9 0-08-055356-7 | ||
020 | |a 1281060275 |9 1-281-06027-5 | ||
020 | |a 9781281060273 |9 978-1-281-06027-3 | ||
035 | |a (DE-627-1)053532317 | ||
035 | |a (DE-599)KEP053532317 | ||
035 | |a (ORHE)9780080553566 | ||
035 | |a (DE-627-1)053532317 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22/eng/20230216 | |
100 | 1 | |a Gregg, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a How to Cheat at Configuring Open Source Security Tools |c Gregg, Michael |
250 | |a 1st edition. | ||
264 | 1 | |a [Place of publication not identified] |b Syngress |c 2011 | |
300 | |a 1 Online-Ressource (528 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; Title from title page (viewed April 18, 2011) | ||
520 | |a The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Software configuration management | |
650 | 0 | |a Open source software | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Logiciels ; Gestion de configurations | |
650 | 4 | |a Logiciels libres | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Open source software | |
650 | 4 | |a Software configuration management | |
700 | 1 | |a Seagren, Eric |e VerfasserIn |4 aut | |
700 | 1 | |a Orebaugh, Angela |e VerfasserIn |4 aut | |
700 | 1 | |a Jonkman, Matt |e VerfasserIn |4 aut | |
700 | 1 | |a Marty, Raffael |e VerfasserIn |4 aut | |
710 | 2 | |a O'Reilly for Higher Education (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597491709 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597491709 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780080553566/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-053532317 |
---|---|
_version_ | 1835903156728365056 |
adam_text | |
any_adam_object | |
author | Gregg, Michael Seagren, Eric Orebaugh, Angela Jonkman, Matt Marty, Raffael |
author_corporate | O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_corporate_role | ctb ctb |
author_facet | Gregg, Michael Seagren, Eric Orebaugh, Angela Jonkman, Matt Marty, Raffael O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_role | aut aut aut aut aut |
author_sort | Gregg, Michael |
author_variant | m g mg e s es a o ao m j mj r m rm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)053532317 (DE-599)KEP053532317 (ORHE)9780080553566 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04003cam a22005892c 4500</leader><controlfield tag="001">ZDB-30-ORH-053532317</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121229.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200625s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553566</subfield><subfield code="9">978-0-08-055356-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553567</subfield><subfield code="9">0-08-055356-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281060275</subfield><subfield code="9">1-281-06027-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281060273</subfield><subfield code="9">978-1-281-06027-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)053532317</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP053532317</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780080553566</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)053532317</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gregg, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to Cheat at Configuring Open Source Security Tools</subfield><subfield code="c">Gregg, Michael</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Syngress</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (528 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed April 18, 2011)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software configuration management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels ; Gestion de configurations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels libres</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software configuration management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seagren, Eric</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Orebaugh, Angela</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jonkman, Matt</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Marty, Raffael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly for Higher Education (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597491709</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597491709</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780080553566/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-053532317 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:14:47Z |
institution | BVB |
isbn | 9780080553566 0080553567 1281060275 9781281060273 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (528 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Gregg, Michael VerfasserIn aut How to Cheat at Configuring Open Source Security Tools Gregg, Michael 1st edition. [Place of publication not identified] Syngress 2011 1 Online-Ressource (528 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; Title from title page (viewed April 18, 2011) The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't. Computer networks Security measures Software configuration management Open source software Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels ; Gestion de configurations Logiciels libres Computer networks ; Security measures Seagren, Eric VerfasserIn aut Orebaugh, Angela VerfasserIn aut Jonkman, Matt VerfasserIn aut Marty, Raffael VerfasserIn aut O'Reilly for Higher Education (Firm), MitwirkendeR ctb Safari, an O'Reilly Media Company. MitwirkendeR ctb 9781597491709 Erscheint auch als Druck-Ausgabe 9781597491709 |
spellingShingle | Gregg, Michael Seagren, Eric Orebaugh, Angela Jonkman, Matt Marty, Raffael How to Cheat at Configuring Open Source Security Tools Computer networks Security measures Software configuration management Open source software Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels ; Gestion de configurations Logiciels libres Computer networks ; Security measures |
title | How to Cheat at Configuring Open Source Security Tools |
title_auth | How to Cheat at Configuring Open Source Security Tools |
title_exact_search | How to Cheat at Configuring Open Source Security Tools |
title_full | How to Cheat at Configuring Open Source Security Tools Gregg, Michael |
title_fullStr | How to Cheat at Configuring Open Source Security Tools Gregg, Michael |
title_full_unstemmed | How to Cheat at Configuring Open Source Security Tools Gregg, Michael |
title_short | How to Cheat at Configuring Open Source Security Tools |
title_sort | how to cheat at configuring open source security tools |
topic | Computer networks Security measures Software configuration management Open source software Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels ; Gestion de configurations Logiciels libres Computer networks ; Security measures |
topic_facet | Computer networks Security measures Software configuration management Open source software Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels ; Gestion de configurations Logiciels libres Computer networks ; Security measures |
work_keys_str_mv | AT greggmichael howtocheatatconfiguringopensourcesecuritytools AT seagreneric howtocheatatconfiguringopensourcesecuritytools AT orebaughangela howtocheatatconfiguringopensourcesecuritytools AT jonkmanmatt howtocheatatconfiguringopensourcesecuritytools AT martyraffael howtocheatatconfiguringopensourcesecuritytools AT oreillyforhighereducationfirm howtocheatatconfiguringopensourcesecuritytools AT safarianoreillymediacompany howtocheatatconfiguringopensourcesecuritytools |