Build Your Own Security Lab: A Field Guide for Network Testing
2009-03-28 22:25
489 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
Many books tell you what to do. This one tells you how.
If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.
*Collect the necessary hardware and software and assemble your own network lab
*Configure a bootable Linux CD
*Explore various methods for gathering information about existing security
*Identify automated attack and penetration tools
*Understand cryptographic systems and encryption and authentication attacks
*Learn to find, identify, and defeat malware
*Address the special protection needs of wireless systems
*Use Snort® to build an IDS that will help to detect and identify attacks in real time
http://rapidshare.com/files/177731599/0470179864.rar http://depositfiles.com/files/diapo5s5k
Many books tell you what to do. This one tells you how.
If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.
*Collect the necessary hardware and software and assemble your own network lab
*Configure a bootable Linux CD
*Explore various methods for gathering information about existing security
*Identify automated attack and penetration tools
*Understand cryptographic systems and encryption and authentication attacks
*Learn to find, identify, and defeat malware
*Address the special protection needs of wireless systems
*Use Snort® to build an IDS that will help to detect and identify attacks in real time
http://rapidshare.com/files/177731599/0470179864.rar http://depositfiles.com/files/diapo5s5k
相关文章推荐
- Why Should You Build Your Own Business Website For Marketing Your Business?
- Network Security Hacks: Tips & Tools for Protecting Your Privacy [ILLUSTRATED]
- Rockie's Android Porting Guide(1)——Build your own board
- Hack Attacks Testing: How to Conduct Your Own Security Audit
- How to Build Your Own Rogue GSM BTS for Fun and Profit
- Rapid Portlet Development with WebSphere Portlet Factory: Step-by-Step Guide for Building Your Own P
- Android.mk for your own module
- Android.mk for your own module
- Build Your Own Website
- Android.mk for your own module
- Network Security Assessment: Know Your Network
- opencv build and configuration for our own code
- Beginning Microsoft Office Live: Build Your Own Web Site Quickly and Easily
- This app has been built with an incorrect configuration. Please configure your build for VectorDrawa
- Build Your Own RAC Cluster on Linux and FireWire
- A Formal Approach for Testing Security Rules
- Build your OWN Apple iBeacon with a Raspberry Pi
- The security validation for this page is invalid. Click Back in your Web错误
- The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments
- 【转载】How to build and run your first deep learning network