Building Open Source Network Security Tools

Building Open Source Network Security Tools
Author :
Publisher : John Wiley & Sons
Total Pages : 450
Release :
ISBN-13 : 9780471445456
ISBN-10 : 0471445452
Rating : 4/5 (52 Downloads)

Book Synopsis Building Open Source Network Security Tools by : Mike Schiffman

Download or read book Building Open Source Network Security Tools written by Mike Schiffman and published by John Wiley & Sons. This book was released on 2002-12-03 with total page 450 pages. Available in PDF, EPUB and Kindle. Book excerpt: Learn how to protect your network with this guide to building complete and fully functional network security tools Although open source network security tools come in all shapes and sizes, a company will eventually discover that these tools are lacking in some area—whether it's additional functionality, a specific feature, or a narrower scope. Written by security expert Mike Schiffman, this comprehensive book will show you how to build your own network security tools that meet the needs of your company. To accomplish this, you'll first learn about the Network Security Tool Paradigm in addition to currently available components including libpcap, libnet, libnids, libsf, libdnet, and OpenSSL. Schiffman offers a detailed discussion of these components, helping you gain a better understanding of the native datatypes and exported functions. Next, you'll find several key techniques that are built from the components as well as easy-to-parse programming examples. The book then ties the model, code, and concepts together, explaining how you can use this information to craft intricate and robust security programs. Schiffman provides you with cost-effective, time-saving guidance on how to build customized network security tools using existing components. He explores: A multilayered model for describing network security tools The ins and outs of several specific security-related components How to combine these components into several useful network security techniques Four different classifications for network security tools: passive reconnaissance, active reconnaissance, attack and penetration, and defensive How to combine techniques to build customized network security tools The companion Web site contains all of the code from the book.


Building Open Source Network Security Tools Related Books

Building Open Source Network Security Tools
Language: en
Pages: 450
Authors: Mike Schiffman
Categories: Computers
Type: BOOK - Published: 2002-12-03 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Learn how to protect your network with this guide to building complete and fully functional network security tools Although open source network security tools c
Network Security Tools
Language: en
Pages: 350
Authors: Nitesh Dhanjani
Categories: Computers
Type: BOOK - Published: 2005 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus
Network Security Through Data Analysis
Language: en
Pages: 416
Authors: Michael S Collins
Categories: Computers
Type: BOOK - Published: 2014-02-10 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Mi
Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture
Language: en
Pages: 245
Authors: Anand Handa
Categories: Computers
Type: BOOK - Published: 2022-09-01 - Publisher: CRC Press

DOWNLOAD EBOOK

Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with k
The Practice of Network Security Monitoring
Language: en
Pages: 436
Authors: Richard Bejtlich
Categories: Computers
Type: BOOK - Published: 2013-07-15 - Publisher: No Starch Press

DOWNLOAD EBOOK

Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective comput