Host Integrity Monitoring Using Osiris and Samhainby Brian Wotring
This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments.
Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy.
* Brian Wotring is the creator of Osiris. He speaks and writes frequently on Osiris for major magazines, Web sites, and trade shows. And, the book can be prominently marketed from the Osiris Web site
* This is the first book published on host integrity monitoring, despite the widespread deployment of
Osiris and Samhain
* Host Integrity Monitoring is the only way to accurately determine if a malicious attacker has successfully compromised the security measures of your network
- Elsevier Science
- Publication date:
- Sold by:
- Barnes & Noble
- NOOK Book
- File size:
- 14 MB
- This product may take a few minutes to download.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >
The information necessary for you to understand the what, why, and how of host integrity monitoring, can be found in this book. Authors Brian Wotring, Bruce Potter, Rainer Wichmann and Marcus Ranum, have done an outstanding job of providing you with a book that walks you through the entire process of establishing host integrity monitoring, including the fundamentals, understanding threats, planning, deployment, administration and response. Wotring, Potter, Wichmann and Ranum begin by revealing everything that is involved in maintaining the integrity of your hosts. Next, the authors explore the many areas of the host environment with respect to establishing an effective host integrity monitoring system (HIMS). Then, they examine some of the most common threats to the integrity of a host environment. The authors continue by walking you through the process of planning the deployment of a HIMS. In addition, the authors next introduce you to Osiris and Samhain. They also provide in-depth practical information about how to properly deploy, configure, and administer the Osiris HIMS. The authors next deal with life after deployment. Finally, they outline some progressive techniques that can be used to strengthen and fine-tune your host integrity monitoring deployment. With the preceding in mind, the authors have done an excellent job of providing the readership with a book that shows what is involved in planning and deploying an effective host integrity monitoring system. At the end of the day, you'll learn the importance of monitoring various elements of the host environment, how to plan for deployment, and how to interpret and respond to integrity violations.