Contents: Chapter 1. Intrusion Detection Systems; Chapter 2. Introducing Snort 2.6; Chapter 3. Installing Snort 2.6; Chapter 4. Configuring Snort and Add-Ons; Chapter 5. Inner Workings; Chapter 6. Preprocessors; Chapter 7. Playing by the Rules; Chapter 8. Snort Output Plug-Ins; Chapter 9. Exploring IDS Event Analysis, Snort Style; Chapter 10. Optimizing Snort; Chapter 11. A…
Contents: Ch. 1 The Principles of Auditing Security Fundamentals: The Five Pillars Building a Security Program Security Controls Managing Risk How, What, and Why You Audit ch. 2 Information Security and the Law IT Security Laws Hacking, Cracking, and Fraud Laws Intellectual Property Laws Can-Spam Act of 2003 State and Local Laws Reporting a Crime Regulatory C…
Table of Contents Chapter 1 Tools of the Trade 1.1 Objectives 1.2 Approach 1.3 Core technologies 1.4 Open source tools 1.5 Case study: the tools in action 1.6 Hands-on challenge Chapter 2 Reconnaissance 2.1 Objective 2.2 A methodology for reconnaissance 2.3 Intelligence gathering 2.4 Footprinting 2.5 Human recon 2.6 Verification 2.7 Case study: the tools in action 2.8 Hands-…
Table of Contents Chapter 1 Packet Analysis and Network Basics Packet Analysis and Packet Sniffers How Computers Communicate Traffic Classifications Final Thoughts Chapter 2 Tapping into the Wire Living Promiscuously Sniffing Around Hubs Sniffing in a Switched Environment Sniffing in a Routed Environment …
Table of contents Introduction. Chapter 1 Understanding Core Security Principles. Chapter 2 Understanding Malware and Social Engineering. Chapter 3 Understanding User Authentication. Chapter 4 Securing Access with Permissions. Chapter 5 Using Audit Policies and Network Auditing. Chapter 6 Protecting Clients and Servers. Chapter 7 Protecting a Network. Chapter 8 Understanding Wireless S…
Table of Contents Chapter 1 Networking Models What Is a Model? Why Use a Model? OSI Model Introducing TCP/IP Chapter 2 Ethernet Remember the Models Structure Ethernet Type II vs. 802.3 MAC Addresses—Another Look Ethernet Operation Shared Media Physical Layer Encoding Other Types of Signaling Topologies Final Th…
Table of Contents 1. Intro to Command Shell Scripting - Information in this Chapter - On Shell Scripting - UNIX, Linux, and OS X Shell Scripting - Bash Basics - Putting It All Together with Bash - Windows Scripting - PowerShell Basics - Putting it all together with PowerShell 2. Intro to Python - Information in this Chapter - What is Python? - W…
Daftar isi: BAB 1 Mengenal berbagai peralatan untuk membuat jaringan komputer BAB 2 Proses pembuatan jaringan komputer BAB 3 Konfigurasi jaringan komputer menggunakan MS windows BAB 4 Membuat jaringan internet BAB 5 Username dan password tiap-tiap komputer BAB 6 Membatasi penggunaan komputer BAB 7 Berbagai file (file sharing) BAB 8 Konsultasi internal antarjaringan komputer B…
CONTENTS: 1. Introduction to network maintenance 2. Introduction to troubleshooting processes 3. The maintenance and troubleshooting toolbox 4. Basic cisco catalyst switch troubleshooting 5. Advanced cisco catalyst switch troubleshooting 6. Introduction to troubleshooting routing protocols 7. OSPF and route redistribution troubleshooting 8. Troubleshooting BGP and router performa…
Buku ini akan memberikan berbagai contoh kofigurasi sesuai kebutuhan Anda. Selain bersifat konseptual, buku ini juga bersifat praktis sehingga mudah dipahami oleh para pembacanya. Untuk itu, Anda dapat langsung mempraktikkan konfigurasi-konfigurasi yang dibahas menggunakan router. Jika router tidak dimiliki, Anda bias mempraktikkannya menggunakan router simulator yang banyak tersedia di Internet.