Guide to Securing Intranet and Extranet Servers
Publisher: VeriSign 2000
Number of pages: 39
As Intranets and Extranets have become more widely deployed, new security challenges have emerged. This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use. The guide also describes how an intelligently deployed Public Key Infrastructure (PKI) system, based on digital certificate technology, addresses these security goals.
Download or read it online for free here:
by Rafeeq Ur Rehman - Prentice Hall PTR
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
by Tony Howlett - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
by A. Orebaugh, S. Biles, J. Babbin - O'Reilly Media
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
by Gordon Fyodor Lyon - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.