1 / 334
文档名称:

Linux Firewalls - Attack Detection and Response with iptables, psad, and fwsnort (No Starch Press).pdf

格式:pdf   页数:334
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Linux Firewalls - Attack Detection and Response with iptables, psad, and fwsnort (No Starch Press).pdf

上传人:kuo08091 2013/12/13 文件大小:0 KB

下载得到文件列表

Linux Firewalls - Attack Detection and Response with iptables, psad, and fwsnort (No Starch Press).pdf

文档介绍

文档介绍:U S E I P T A B L E S T O
D E T E C T A N D
P R E V E N T LL I I N N U U X X
N E T W O R K - B A S E D
NUX FI ALLS L L WA E IR F X U IN L
NUX FI ALLS L L WA E IR F X U IN L
A T T A C K S FF I I R R E E W W A A L L L L S S
A T T A C K D E T E C T I O N A N D R E S P O N S E W I T H
System administrators need to stay ahead of new • Tools for visualizing iptables logs I P T A B L E S , P S A D , A N D F W S N O R T
security vulnerabilities that leave works exposed
• Passive OS fingerprinting with iptables
every day. A firewall and an intrusion detection system
(IDS) are two important weapons in that fight, enabling Perl and C code snippets offer practical examples M I C H A E L R A S H
you to proactively deny access and work that will help you to maximize your deployment of
traffic for signs of an attack. Linux firewalls.
Linux Firewalls discusses the technical details of the If you’re responsible for keeping work secure, Linux Firewalls is a great book.
iptables firewall and filter framework that are you’ll find Linux Firewalls invaluable in your attempt to —From the foreword by Richard Bejtlich
built into the Linux kernel, and it explains how they understand attacks and use iptables—along with psad of
provide strong filtering, Network Address Translation and fwsnort—to detect and even promises.
(NAT), state tracking, and application layer inspection
A B O U T T H E A U T H O R
capabilities that rival mercial tools. You’ll
learn how to deploy iptables as an IDS with psad and Michael Rash is a security architect with Enterasys
fwsnort and how to build a strong, passive authentica- Networks, Inc., where he develops the Dragon
tion layer around iptables with fwknop. intrusion detection and prevention system. He is a
frequent contributor to open source projects and the
Concrete examples illustrate concepts such as firewall
creator of psad, fwknop, and fwsnort. Rash is an
log analysis and policies, work authentica-
exp

最近更新

个性化酒水定制方案建议书 6页

业务管理规范范本建议书 5页

专业意见建议书 5页

BIM通信领域方案建议书 6页

高端记忆床垫升级建议书 5页

高效设备设计部建议书 5页

高效节食节粮建议书 5页

高效网络平台管理建议书 5页

高效城市交通拥堵治理建议书 6页

高中生学校发展建议书 5页

骨折腰椎治疗策略建议书 6页

餐饮业绿色发展建议书 5页

食品安全整改优化建议书 5页

领导审批建议书 6页

小儿脑瘫的护理跨学科合作 27页

急性中毒患者的家属支持与护理 47页

2024年涟水县幼儿园教师招教考试备考题库附答.. 30页

2024年清流县幼儿园教师招教考试备考题库含答.. 31页

2024年湖北工业职业技术学院马克思主义基本原.. 12页

2024年湖南化工职业技术学院马克思主义基本原.. 13页

2024年滨州职业学院马克思主义基本原理概论期.. 12页

2024年灵丘县招教考试备考题库含答案解析(必.. 31页

2024年甘肃畜牧工程职业技术学院马克思主义基.. 13页

2024年盐城师范学院马克思主义基本原理概论期.. 12页

2024年石河子工程职业技术学院马克思主义基本.. 12页

2024年福建农林大学金山学院马克思主义基本原.. 12页

2024年类乌齐县幼儿园教师招教考试备考题库附.. 31页

2024年芜湖航空职业学院马克思主义基本原理概.. 12页

2024年荔波县幼儿园教师招教考试备考题库附答.. 30页

2024年蔚县幼儿园教师招教考试备考题库带答案.. 31页