Secure Your Network for Free - 1st Edition - ISBN: 9781597491235, 9780080516813

Secure Your Network for Free

1st Edition

Authors: Eric Seagren
Paperback ISBN: 9781597491235
eBook ISBN: 9780080516813
Imprint: Syngress
Published Date: 1st February 2007
Page Count: 512
Tax/VAT will be calculated at check-out
25.99
32.95
41.95
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

  • Lead Author
  • Technical Editors
  • Companion Web Site
  • Chapter 1: Presenting the Business Case for Free Solutions
    • Introduction
    • The Costs of Using Free Security Solutions
    • The Savings of Using Free Security Solutions
    • Comparing Free Solutions with Commercial Solutions
    • “Selling” a Free Solution
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 2: Protecting Your Perimeter
    • Introduction
    • Firewall Types
    • Firewall Architectures
    • Implementing Firewalls
    • Providing Secure Remote Access
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 3: Protecting Network Resources
    • Introduction
    • Performing Basic Hardening
    • Hardening Windows Systems
    • Hardening Linux Systems
    • Hardening Infrastructure Devices
    • Patching Systems
    • Personal Firewalls
    • Providing Antivirus and Antispyware Protection
    • Encrypting Sensitive Data
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 4: Configuring an Intrusion Detection System
    • Introduction
    • Intrusion Detection Systems
    • Configuring an Intrusion Detection System
    • Configuring Snort on a Windows System
    • Configuring Snort on a Linux System
    • Other Snort Add-Ons
    • Demonstrating Effectiveness
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 5: Managing Event Logs
    • Introduction
    • Generating Windows Event Logs
    • Generating Syslog Event Logs
    • Securing Your Event Logs
    • Applying Your Knowledge
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 6: Testing and Auditing Your Systems
    • Introduction
    • Taking Inventory
    • Vulnerability Scanning
    • OSSTMM
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 7: Network Reporting and Troubleshooting
    • Introduction
    • Reporting on Bandwidth Usage and Other Metrics
    • Collecting Data for Analysis
    • Understanding SNMP
    • Troubleshooting Network Problems
    • Additional Troubleshooting Tools
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 8: Security as an Ongoing Process
    • Introduction
    • Patch Management
    • Change Management
    • Antivirus
    • Antispyware
    • Intrusion Detection Systems
    • Vulnerability Scanning
    • Penetration Testing
    • Policy Review
    • Physical Security
    • CERT Team
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Index

Key Features

  • Teachers you how to implement best of breed security using tools for free
  • Ideal for anyone recomending and implementing new technologies within the company

Readership

This book is targeted at the small- to medium-size company IT person. It is likely that this person is responsible for both recommending and evaluating new technologies, and well as actually implementing them. This person will have intermediate level knowledge of network security concepts. The reader likely knows what needs to be done, but needs actual examples of how to do it.

Table of Contents

  • Lead Author
  • Technical Editors
  • Companion Web Site
  • Chapter 1: Presenting the Business Case for Free Solutions
    • Introduction
    • The Costs of Using Free Security Solutions
    • The Savings of Using Free Security Solutions
    • Comparing Free Solutions with Commercial Solutions
    • “Selling” a Free Solution
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 2: Protecting Your Perimeter
    • Introduction
    • Firewall Types
    • Firewall Architectures
    • Implementing Firewalls
    • Providing Secure Remote Access
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 3: Protecting Network Resources
    • Introduction
    • Performing Basic Hardening
    • Hardening Windows Systems
    • Hardening Linux Systems
    • Hardening Infrastructure Devices
    • Patching Systems
    • Personal Firewalls
    • Providing Antivirus and Antispyware Protection
    • Encrypting Sensitive Data
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 4: Configuring an Intrusion Detection System
    • Introduction
    • Intrusion Detection Systems
    • Configuring an Intrusion Detection System
    • Configuring Snort on a Windows System
    • Configuring Snort on a Linux System
    • Other Snort Add-Ons
    • Demonstrating Effectiveness
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 5: Managing Event Logs
    • Introduction
    • Generating Windows Event Logs
    • Generating Syslog Event Logs
    • Securing Your Event Logs
    • Applying Your Knowledge
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 6: Testing and Auditing Your Systems
    • Introduction
    • Taking Inventory
    • Vulnerability Scanning
    • OSSTMM
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 7: Network Reporting and Troubleshooting
    • Introduction
    • Reporting on Bandwidth Usage and Other Metrics
    • Collecting Data for Analysis
    • Understanding SNMP
    • Troubleshooting Network Problems
    • Additional Troubleshooting Tools
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Chapter 8: Security as an Ongoing Process
    • Introduction
    • Patch Management
    • Change Management
    • Antivirus
    • Antispyware
    • Intrusion Detection Systems
    • Vulnerability Scanning
    • Penetration Testing
    • Policy Review
    • Physical Security
    • CERT Team
    • Summary
    • Solutions Fast Track
    • Frequently Asked Questions
  • Index

Details

No. of pages:
512
Language:
English
Copyright:
© Syngress 2006
Published:
Imprint:
Syngress
eBook ISBN:
9780080516813
Paperback ISBN:
9781597491235

About the Author

Eric Seagren

Eric Seagren, CISSP, CISA, ISSAP, JPMorganChase has 10 years experience in IT Security and has spent the last 7 years at, one of the largest financial institutions in the world. Eric has contributed to several computer security books including: Hacking Exposed: Cisco Networks (McGraw-Hill, ISBN: 0072259175), Configuring Checkpoint NGX (Syngress, ISBN: 1597490318), and Hardening Network Security (McGraw-Hill, ISBN: 00725557032).

Affiliations and Expertise

Eric Seagren, CISSP, CISA, ISSAP, JPMorganChase