Build Your Own Security Lab: A Field Guide for Network Testing / Edition 1

Build Your Own Security Lab: A Field Guide for Network Testing / Edition 1

by Michael Gregg
     
 

Many books tell you what to do. This one tells you how.

If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the

See more details below

Overview

Many books tell you what to do. This one tells you how.

If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.

  • Collect the necessary hardware and software and assemble your own network lab
  • Configure a bootable Linux CD
  • Explore various methods for gathering information about existing security
  • Identify automated attack and penetration tools
  • Understand cryptographic systems and encryption and authentication attacks
  • Learn to find, identify, and defeat malware
  • Address the special protection needs of wireless systems
  • Use Snort® to build an IDS that will help to detect and identify attacks in real time

DVD includes tools for actually building and implementing security solutions

  • Open source tools
  • Demo software
  • A bootable version of Linux

Read More

Product Details

ISBN-13:
9780470179864
Publisher:
Wiley
Publication date:
04/28/2008
Edition description:
New Edition
Pages:
456
Sales rank:
624,925
Product dimensions:
7.40(w) x 9.20(h) x 0.98(d)

Related Subjects

Table of Contents

Acknowledgments xxi Introduction xxiii

Chapter 1 Hardware and Gear 1

Chapter 2 Building a Software Test Platform 31

Chapter 3 Passive Information Gathering 63

Chapter 4 Detecting Live Systems 105

Chapter 5 Enumerating Systems 149

Chapter 6 Automated Attack and Penetration Tools 189

Chapter 7 Understanding Cryptographic Systems 225

Chapter 8 Defeating Malware 259

Chapter 9 Securing Wireless Systems 291

Chapter 10 Intrusion Detection 325

Chapter 11 Forensic Detection 365

Appendix A About the DVD 405

Index 409

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >