eBooks-it.org Logo
eBooks-IT.org Inner Image

Syngress eBooks Page 25

Download free Syngress eBooks Page 25

Nessus, Snort & Ethereal Power Tools

Customizing Open Source Security Applications
Nessus, Snort & Ethereal Power Tools Image
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts th...

Nessus Network Auditing

Nessus Network Auditing Image
2nd Edition
The Updated Version of the Bestselling Nessus Book.This is the ONLY Book to Read if You Run Nessus Across the Enterprise Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.* Perform a Vulnerability AssessmentUse Nessus to find programming errors that allow intruders to gain unauthorized acce...

Nagios 3 Enterprise Network Monitoring

Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring Image
The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see how a number of useful add-ons and enhancements for Nagios can extend the functionality of Nagios throughout your organization. And, if you want to learn how to write your own plugins...this is the book for you! In these pages you'll find a cookbook-style chapter full of useful plugins that monitor a variety of devices, from HTTP-based applications to CPU utilization to LDAP servers and more. * Complete Case Study Demonstrates how to Deploy Nagios Globall...

Microsoft Virtualization

Master Microsoft Server, Desktop, Application, and Presentation Virtualization
Microsoft Virtualization Image
Virtualization technologies help IT organizations in three ways: cost-cutting, ease of administration, and the overall effect of IT on the environment. Virtualization cuts costs by reducing the amount of capital resources (equipment), power, and cooling to run an IT infrastructure. Because of the tools that are involved in virtualization, it also reduces the burden of IT management significantly. Finally, by reducing the amount of cooling, power, and other emissions from these servers, virtualization can help IT organizations become more "green."Microsoft growth is up from 2006, when it held an 8% market share to 23%. When this report was released, Hyper-V had just started shipping, and is expected to make substantial market gain for Micros...

Microsoft Forefront

Security Administration Guide
Microsoft Forefront Image
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking ...



2007 - 2017 © eBooks-IT.org