Logo

Open Source Security Tools: Practical Guide to Security Applications

Large book cover: Open Source Security Tools: Practical Guide to Security Applications

Open Source Security Tools: Practical Guide to Security Applications
by

Publisher: Prentice Hall PTR
ISBN/ASIN: 0321194438
ISBN-13: 9780321194435
Number of pages: 600

Description:
Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. Seasoned security expert Tony Howlett has reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the “best of breed” for all major areas of information security. Inside, you’ll find everything from how to harden Linux and Windows systems to how to investigate breaches with Sleuth Kit, Autopsy Forensic Browser, and Forensic Tool Kit. For each security task described, the author reviews the best open source tools and how to use them and also provides a case study and sample implementation.

Download or read it online for free here:
Download link
(12.7MB, PDF)

Similar books

Book cover: Firewalls and Internet Security: Repelling the Wily HackerFirewalls and Internet Security: Repelling the Wily Hacker
by - Addison-Wesley
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
(13842 views)
Book cover: OpenSSHOpenSSH
- Wikibooks
The OpenSSH protocol suite provides secure remote access and file transfer. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.
(6879 views)
Book cover: Improving Web Application Security: Threats and CountermeasuresImproving Web Application Security: Threats and Countermeasures
by - Microsoft Press
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
(14954 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(16237 views)