Book description
If your job is to design or implement IT security solutions or if you?re studying for any security certification, this is the how-to guide you?ve been looking for. Here?s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.
Table of contents
- Copyright
- About the Author
- Credits
- Acknowledgements
- Introduction
- 1. Hardware And Gear
- 2. Building a Software Test Platform
- 3. Passive Information Gathering
- 4. Detecting Live Systems
- 5. Enumerating Systems
- 6. Automated Attack and Penetration Tools
-
7. Understanding Cryptographic Systems
- 7.1. Encryption
- 7.2. Authentication
- 7.3. Biometrics
- 7.4. Encryption and Authentication Attacks
- 7.5. Summary
- 7.6. Key Terms
- 7.7. Exercises
- 8. Defeating Malware
- 9. Securing Wireless Systems
-
10. Intrusion Detection
- 10.1. Overview of Intrusion Detection and Prevention
- 10.2. IDS Types and Components
- 10.3. IDS Engines
- 10.4. An Overview of Snort
- 10.5. Installing Snort on a Windows System
- 10.6. Building Snort Rules
- 10.7. The Snort User Interface
- 10.8. Advanced Snort: Detecting Buffer Overflows
- 10.9. Responding to Attacks/Intrusions
- 10.10. Summary
- 10.11. Key Terms
- 10.12. Exercises
- 11. Forensic Detection
- A. About the DVD
Product information
- Title: Build Your Own Security Lab: A Field Guide for Network Testing
- Author(s):
- Release date: April 2008
- Publisher(s): Wiley
- ISBN: 9780470179864
You might also like
book
Building a Pentesting Lab for Wireless Networks
Build your own secure enterprise or home penetration testing lab to dig into the various hacking …
book
Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …
book
Windows 10 for Enterprise Administrators
Tag line About This Book Learn the art of configuring, deploying, managing and securing Windows 10 …
book
Wireshark for Security Professionals
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide …