Showing posts with label network security. Show all posts
Showing posts with label network security. Show all posts

Dissecting the Hack: The F0rb1dd3n Network Review

Dissecting the Hack: The F0rb1dd3n Network
Average Reviews:

(More customer reviews)
Are you looking to buy Dissecting the Hack: The F0rb1dd3n Network? Here is the right place to find the great deals. we can offer discounts of up to 90% on Dissecting the Hack: The F0rb1dd3n Network. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Dissecting the Hack: The F0rb1dd3n Network ReviewLet me get this out of the way: If books could be reviewed as "first effort" this would be a five/five. For a really ambitious book out of the gate it does a decent job of hitting tons of domains from multiple angles to inform, excite, and influence the thought processes of the reader.
To be even more honest had I thumbed through this book before buying it I would not have bought it. A lot of alarms can go off when you see pictures of vendor equipment, tables of network services, and a touch of conspiracy theory in places. Not that those things are inherently bad but it's only a 400 page tome so that's a lot of real estate to be worried about misusing. The authors use those pages as well as can be expected and in a way that even the most jaded readers should be able to ~respect~ if not always appreciate.
I'm not being hard on this book, trust me. It's now the third book, along with Silence on the Wire, and Anderson's Security Engineering, I expect all newer ITSec professionals to read early and often. I don't judge a non-textbook by the accuracy or timeliness of every statement. Or the quality of the story telling or case studied. I judge these types of books by their ability to affect ~thought processes~, ~perspective~, and ~risk analysis~... and I think this book is a winner on all three counts. It is all about influencing thought, not hand-feeding PRECISE EXACTING and ultimately useless step-by-step hacks.
Solid 4/4.5 star on any scale and a 5/5 for a new set of authors. I hope the editors and publisher give them the opportunity to add about 120/150 pages and build a community. One last note, the books and resources noted within this book are good stand-up lists and should not be overlooked either. The single paragraph stories from the web or people profiles are not to be skipped over.Dissecting the Hack: The F0rb1dd3n Network Overview
Dissecting the Hackis one heck of a ride! Hackers, IT professionals, and Infosec aficionados will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats.

Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book!

Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
Introduces basic hacking techniques in real life context for ease of learning
Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack


Want to learn more information about Dissecting the Hack: The F0rb1dd3n Network?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Configuring IPCop Firewalls: Closing Borders with Open Source: How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time ... VPN with this powerful Open Source solution Review

Configuring IPCop Firewalls: Closing Borders with Open Source: How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time ... VPN with this powerful Open Source solution
Average Reviews:

(More customer reviews)
Are you looking to buy Configuring IPCop Firewalls: Closing Borders with Open Source: How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time ... VPN with this powerful Open Source solution? Here is the right place to find the great deals. we can offer discounts of up to 90% on Configuring IPCop Firewalls: Closing Borders with Open Source: How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time ... VPN with this powerful Open Source solution. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Configuring IPCop Firewalls: Closing Borders with Open Source: How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time ... VPN with this powerful Open Source solution ReviewI use IPCop at a 30 users network. We also route specific applications through different T1 connections, and have plenty of custom iptables rules.
IPCop per se is a great product.
I can't say the book is bad but it does not add any substantial information to the documentation you can find at IPCop site and download for free.
Buy it only if you want to pay for freely available documentation or if you are a book bluff.Configuring IPCop Firewalls: Closing Borders with Open Source: How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time ... VPN with this powerful Open Source solution OverviewThis book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. Anyone interested in securing their networks with IPCop - from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.

Want to learn more information about Configuring IPCop Firewalls: Closing Borders with Open Source: How to setup, configure and manage your Linux firewall, web proxy, DHCP, DNS, time ... VPN with this powerful Open Source solution?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts Review

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Average Reviews:

(More customer reviews)
Are you looking to buy Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts? Here is the right place to find the great deals. we can offer discounts of up to 90% on Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts ReviewThis is a rather short (Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts Overview
It's no longer just a buzz word: "Security" is an important part of your job as a Systems Administrator. Most security books are aimed at security professionals, but Security for System Administrators is written for System Administrators. This book covers the basics of securing your system environment as well as security concepts and how these concepts can be implemented practically using common tools and applications. Whether you are new to this profession or have been in the field a while, you'll find valuable information in each chapter. The book's examples will focus on Windows Server 2008 R2 and Windows 7, but many concepts are platform agnostic.

Take all the confusion out of security including: network attacks, system failures, social networking, and even audits
Learn how to apply and implement general security concepts
Identify and solve situations within your network and organization


Want to learn more information about Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Security Architecture: Design, Deployment and Operations Review

Security Architecture: Design, Deployment and Operations
Average Reviews:

(More customer reviews)
Are you looking to buy Security Architecture: Design, Deployment and Operations? Here is the right place to find the great deals. we can offer discounts of up to 90% on Security Architecture: Design, Deployment and Operations. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Security Architecture: Design, Deployment and Operations ReviewBoeing Aircraft is currently working on its next big airplane, the Sonic Cruiser. But even before a prototype of the Sonic Cruiser takes to the skies, tens of thousands of hours will have been spent on design, planning, testing, legal, administrative, and other tasks.
The product development scenario for information technology and information security is radically different. Corporate networks are being rolled out with planning and design that is not on par with that of our counterparts in the aviation and construction industries. In fact, already complex corporate networks are continuously becoming more byzantine. Take an average MIS department and add up all their hardware vendors, network topologies and protocols, operating systems, software add-ons, and custom-written applications. Now try to securely integrate them. If security was not designed into the original system architecture, how can these security products be expected to work? Despite the fact that companies are spending more and more money on information systems security, the systems are growing more and more complex -- and complex systems are much harder to protect.
Security Architecture: Design, Deployment and Operations, is intended to help readers design and deploy better security technologies. The authors believe that security architecture must be comprehensive, because a network that is 98% secure is actually 100% insecure. This is especially true, given that -- contrary to popular belief -- information security is not a pure science, but a mixture of art and science.
Effective information security must encompass every aspect of the enterprise. Security Architecture shows how to design a secure infrastructure. It addresses all of the major security products and provides details on how to deploy them.
The authors incisively write that it is not enough for security professionals to understand the theory behind information security; unless they are able to insert security controls in the proper places within an application (data flows, storage and processing), the security solution will not be effective. A security product that is implemented incorrectly is like medicine that is taken improperly: great in potential, but futile in reality.
In addition, if the inserted security solution is not managed with the proper processes in place (e.g., change management, separation of duties, notification, and escalation), the level of security provided will degrade with time until the control becomes ineffective.
The book covers all of the fundamentals of information security. Particularly noteworthy is Chapter 3, "Information Classification and Access Control Plan." As companies place more of their corporate data jewels on often-untrusted public networks, the lack of an information classification scheme can have significant negative security consequences. Also, access control is critical in that many organizations -- and even the media -- are busy obsessing about remote hackers from foreign countries and have become oblivious to the real threats to information security: insiders. While it is much more romantic to think about foreigners hacking into your system in the middle of the night, the reality is that most breaches occur via insiders during normal business hours.
The authors of Security Architecture discuss the elements needed to design and deploy effective information security architecture. Critical security products such as PKI, firewalls, VPN, IDS, and others are discussed, but cryptographic accelerators are not mentioned.
This book highlights best practices and security standards and guidelines for effectively securing an enterprise. The book is well organized and easy to read. Many chapters have additional references and URL's for further research.
The inclusion of numerous case studies, combined with the authors' real-world experience, makes Security Architecture a valuable reference. No one would ever want to get on a plane that had not been properly designed and tested. Neither should we want to use networks that have not been adequately designed and tested from a security standpoint. Security Architecture is intended to make sure that doesn't happen.Security Architecture: Design, Deployment and Operations OverviewWill more than 1.3 trillion dollars expected to be spent via e-business on the Internet by 2003, security has never been more important. This title offers a practical, step-by-step approach, and shows how to design and deploy security sucessfully across the enterprise.

Want to learn more information about Security Architecture: Design, Deployment and Operations?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul Review

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
Average Reviews:

(More customer reviews)
Are you looking to buy InfoSec Career Hacking: Sell Your Skillz, Not Your Soul? Here is the right place to find the great deals. we can offer discounts of up to 90% on InfoSec Career Hacking: Sell Your Skillz, Not Your Soul. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul ReviewI enjoyed reading this book and I kept thinking to myself, "I wished this book would have existed when I tried to break into Information Security/Information Assurance. So far I've had a pretty successful IA career and as I read each chapter of the book I realized that I basically followed almost all of the books suggestions, some by my own plans and some by accident.
This book is definitely authored by an all-star cast so I was excited to crack the seal. I liked the sections on employment opportunities and who's hiring. The brief IA overview was definitely necessary. I was also fond of the Laws of Security content. I've never thought about those laws and how true they really are.
When I get time my friend and I plan to use the Creating an Attack Lab content. It was a good collection of theory and tool descriptions.
Overall this book is a good read and even though I've been in the Information Assurance field for over 8 years now I plan to use it as a reference and to build me an attack lab ASAP.
All IA/Infosec newbies should read this....it could have saved me some stress when I was just a noob!
Mark Cavey, CISSP-ISSAP, IAM, IEM, CHS
Senior Computer Network Defense Engineer
InfoSec Career Hacking: Sell Your Skillz, Not Your Soul Overview"InfoSec Career Hacking" starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight on how to develop the requisite soft skills to migrate form the hacker to corporate world.* The InfoSec job market will experience explosive growth over the next five years, and many candidates for these positions will come from thriving, hacker communities * Teaches these hackers how to build their own test networks to develop their skills to appeal to corporations and government agencies * Provides specific instructions for developing time, management, and personal skills to build a successful InfoSec career

Want to learn more information about InfoSec Career Hacking: Sell Your Skillz, Not Your Soul?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Mastering Windows Network Forensics and Investigation Review

Mastering Windows Network Forensics and Investigation
Average Reviews:

(More customer reviews)
Are you looking to buy Mastering Windows Network Forensics and Investigation? Here is the right place to find the great deals. we can offer discounts of up to 90% on Mastering Windows Network Forensics and Investigation. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Mastering Windows Network Forensics and Investigation ReviewAs a law enforcement officer, I've often found myself frustrated by books that cover incident response, but never discuss law enforcement involvement, except as an afterthought. While I understand that it's important for corporate and internal investigators to have this type of information, it's refreshing to find a book that talks about the law enforcement response to an computer crime incident.
I've had the privilege of attending classes instructed by both of these authors. One of the things that impressed me about their classes is that they were able to break down complicated technical concepts into terms that cops can understand. They continue to do that in this book.
Computer crime investigators need to add this book to their libraries. I'd say it's a must have.
Mastering Windows Network Forensics and Investigation OverviewThis comprehensive guide provides you with the training you need to arm yourself against phishing, bank fraud, unlawful hacking, and other computer crimes. Two seasoned law enforcement professionals discuss everything from recognizing high-tech criminal activity and collecting evidence to presenting it in a way that judges and juries can understand. They cover the range of skills, standards, and step-by-step procedures you'll need to conduct a criminal investigation in a Windows environment and make your evidence stand up in court.

Want to learn more information about Mastering Windows Network Forensics and Investigation?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning Review

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Average Reviews:

(More customer reviews)
Are you looking to buy Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning? Here is the right place to find the great deals. we can offer discounts of up to 90% on Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning ReviewEarlier this year Fyodor sent me a pre-publication review copy of his new self-published book, Nmap Network Scanning (NNS). I had heard of Fyodor's book when I wrote my 3 star review of Nmap in the Enterprise in June, but I wasn't consciously considering what could be in Fyodor's version compared to the Syngress title. Although the copy I read was labelled "Pre-Release Beta Version," I was very impressed by this book. Now that I have the final copy (available from Amazon) in my hands, I am really pleased with the product. In short, if you are looking for *the* book on Nmap, the search is over: NNS is a winner.
I've reviewed dedicated "tool" books before, including titles about Snort, Nessus, and Nagios. NNS dives into the internals of Nmap unlike any other title I've read. Without Nmap author Fyodor as the author, I think any competitor would need to have thoroughly read the source code of the application to have a chance at duplicating the level of detail Fyodor includes in NNS.
Instead of just describing how to use Nmap, Fyodor explains how Nmap works. Going even further, he describes the algorithms used to implement various tests, and why he chose those approaches. The "Idle Scan Implementation Algorithsm" section in Ch 5 is a great example of this sort of material. I will probably just refer students of my TCP/IP Weapons School class to this part of NNS when we discuss the technique!
One of the best parts of NNS, mentioned but explained in no other text, is the Nmap Scripting Engine (NSE). Ch 9 is all about NSE, with a brief intro to Lua and excellent documentation of using and building upon NSE. Beyond this groundbreaking material readers will find many examples of Nmap case studies from users. This and other sections help make NNS a practical book, showing how people use Nmap in their environments for a variety of purposes.
If you use Nmap, for any reason, you should buy this book. Everyone (except author Fyodor) will learn something about network reconnaissance from this text.Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning OverviewNmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire.
Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.
Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http://nmap.org/book for more information and sample chapters.

Want to learn more information about Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Juniper Networks Secure Access SSL VPN Configuration Guide Review

Juniper Networks Secure Access SSL VPN Configuration Guide
Average Reviews:

(More customer reviews)
Are you looking to buy Juniper Networks Secure Access SSL VPN Configuration Guide? Here is the right place to find the great deals. we can offer discounts of up to 90% on Juniper Networks Secure Access SSL VPN Configuration Guide. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Juniper Networks Secure Access SSL VPN Configuration Guide ReviewThis is an excellent book. It provides a lot of helpful information on how to set up a Juniper SA appliance. The information in this book has helped us organize the user and resource profiles in our installation, as well as set up remote access to Citrix applications. I recommend this book to anyone setting up or administering a Juniper Secure Access SSL VPN.Juniper Networks Secure Access SSL VPN Configuration Guide OverviewJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.* Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP.* Learn to scale your appliances to meet the demands of remote workers and offices.* Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.

Want to learn more information about Juniper Networks Secure Access SSL VPN Configuration Guide?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh)) Review

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh))
Average Reviews:

(More customer reviews)
Are you looking to buy Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh))? Here is the right place to find the great deals. we can offer discounts of up to 90% on Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh)). Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh)) ReviewCovers many of the tools related to CEH certification, obviously not in a highly-detailed fashion.
There are typos, such as defining availability as "locking data that is in use....". Link to the student resource center leads to a "coming soon" page (to access the supplemental materials available online, use the registration number in the back of the book - access is given for 180 days).
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh)) OverviewThe EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council.This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.

Want to learn more information about Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh))?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Security Log Management: Identifying Patterns in the Chaos Review

Security Log Management: Identifying Patterns in the Chaos
Average Reviews:

(More customer reviews)
Are you looking to buy Security Log Management: Identifying Patterns in the Chaos? Here is the right place to find the great deals. we can offer discounts of up to 90% on Security Log Management: Identifying Patterns in the Chaos. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Security Log Management: Identifying Patterns in the Chaos ReviewWhen I received a review copy of Security Log Management (SLM) last month, I was eager to read it. I saw two very powerful but seldom discussed tools -- Argus and Bro -- mentioned in the table of contents. This indicated some original thinking, which I appreciate. Unfortunately, SLM did not live up to my expectations. When you strip out the pages of scripts and code and the three reprinted chapters, you're left with a series of examples of output from the author's deployment of several tools. Aside from a few examples mentioned in this review, I don't think readers will learn much from SLM.
The first problem with SLM is a lack of competent editing. Prior to publication, someone should have read the book from the reader's perspective, asking "what is the reader expected to learn from this section/chapter/book?" In other words, the editor should have asked "how is the reader supposed to implement these recommendations?" For example, Ch 2 mentions using the Bro IDS. Nothing about setting up Bro is included, which would be acceptable if a reference to an online guide or another book was given. That is not the case; the author just assumes readers know about Bro and have it running. The number of Bro users is probably less than 100. If you're one of them, you don't need to read this book!
Bro's DNS and SMTP logging modules are casually demonstrated with no regard for showing the reader how to deploy them. The Web module at least shows a sample mt.bro file, if the reader can figure out what that is or how it fits into the picture. The situation gets worse on p 101 when the author says "the SMTP module can be very powerful in helping to identify several of the 'Marcus Ranum' top mail-related statistics (Chapter 1)." Marcus Ranum is not mentioned at all in Ch 1.
SLM demonstrates two other features that are becoming increasingly common and frustrating in Syngress books, for which I detracted stars from the review. First, the editing is rough. I am perplexed by the inability to standardize on references to tools; e.g., is it bro, Bro, or BRO? Second, and far more worrisome, the last three chapters (7, 8, and 9) of SLM are reprints of chapters 6, 7, and 5 from the Feb 2005 Syngress book Microsoft Log Parser Toolkit. On the positive side, SLM did not have as many fuzzy screen shots as sometimes appear in recent Syngress books. The unexplained small, fuzzy, NetForensics screen shot on p 31 is one unwelcome exception.
In terms of stating a clear purpose and delivering material in a coherent manner, the best chapter in SLM is Ch 6 -- Scalable Enterprise Solutions. I thought the author of this chapter stated his purpose, and then delivered material that readers could use. My only problem with the chapter was reading the definition of ESM 5 times -- on pp 195, 196, 205, 237, and 238!
My favorite part of SLM was the material showing how to put Argus records into a MySQL database. This is not that common, so I was glad to see how the author implements that function.
I'm sorry I can't recommend reading SLM in its current form. Three stars means there is some value, but you could get what you need browsing in the book store. I would like to see a second edition of SLM cut out the reprinted chapters. That cuts the book down to 241 pages. If the 70 or so pages of code are moved online, that reduces the book to 171 pages. That leaves plenty of room to add material that meets readers' needs. An example of a very strong Syngress book on a related (host-based) topic is Host Integrity Monitoring Using Osiris and Samhain by Brian Wotring.Security Log Management: Identifying Patterns in the Chaos OverviewThis book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the "Top 10" list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site.Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of "log file." This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.* Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network* Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. * Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks

Want to learn more information about Security Log Management: Identifying Patterns in the Chaos?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Review

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Average Reviews:

(More customer reviews)
Are you looking to buy Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems? Here is the right place to find the great deals. we can offer discounts of up to 90% on Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems ReviewAre you a plant operator with an advanced electrical engineering degree and a decade of logic programming? If you are, then this book is for you! Author Eric D. Knapp, has done an outstanding job of writing a book that attempts to define an approach to industrial network security that considers the unique network, protocol, and application characteristics of an industrial control system, while also taking into consideration a variety of common compliance controls.
Knapp, begins with a very brief introduction to industrial networks as they relate to the critical infrastructure; those infrastructures upon which our society, industry, and the way of life depend on. In addition, the author introduces industrial networks in terms of cyber security, by examining the interrelations between general networking, industrial networking, and potentially critical infrastructures. He then focuses on industrial network protocols, including Modbus, DNP3, OPC, ICCP, and others, in both their native/original fieldbus form or in modernized TCP/IP or in real-time Ethernet implementations. The author then, discusses control system assets, network architectures, control system operations, and how control processes are managed, with special emphasis on smart grid operations. He continues by providing a high-level overview of common attack methodologies, and how industrial networks present a unique attack surface with common attack vectors to many critical areas. In addition, the author shows you how to separate functional groups and where enclave boundaries should be implemented. He then discusses several contributing factors to obtaining situational awareness, including how to use anomaly detection, exception reporting, and information correlation for the purposes of threat and risk detection. The author then shows you what to monitor, why, and how. Then, he attempts to map cyber security-related controls from some common standards (including NERC CIP, CFATS, ISO/IEC 27002:2005, NRC RG 5.71, and NIST 800-82), to the security recommendations made within this book. The author continues by addressing the issues and changes that are made to a drive when the console connects to XBOX Live service for online game play. Finally, he highlights some common pitfalls and mistakes, including errors of complacency, common misconfigurations, and deployment errors.
This most excellent book, provides deployment and configuration guidance where possible. Perhaps more importantly, this book identifies why security controls should be implemented, where they should be implemented, how they should be implemented, and how they should be used.Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Overview
For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to be secured. Industrial Network Security examines the unique protocols and applications that are the foundation of industrial control systems and provides you with comprehensive guidelines for their protection. While covering compliance guidelines, attacks and vectors, and even evolving security tools, this book gives you a clear understanding of SCADA and Control System protocols and how they operate.

Covers implementation guidelines for security measures of critical infrastructure
Applies the security measures for system-specific compliance
Discusses common pitfalls and mistakes and how to avoid them


Want to learn more information about Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Security+ Guide to Network Security Fundamentals Review

Security+ Guide to Network Security Fundamentals
Average Reviews:

(More customer reviews)
Are you looking to buy Security+ Guide to Network Security Fundamentals? Here is the right place to find the great deals. we can offer discounts of up to 90% on Security+ Guide to Network Security Fundamentals. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Security+ Guide to Network Security Fundamentals ReviewI bought this book for two reasons: first I needed it for a security class this summer, second I needed a book with good testing software to prepare for the CompTIA Security+ exam. It served its purpose and I passed the exam easily.
The practice exam software is good, but I have used this exam engine from Certblaster before and the question text size they use is too small, which is very irratiting especially since there is plenty of room to use a larger text size. Unlike other books that use the same Certblaster software (usually a Course Technology publication), this one does not use the other functions that the test software offers, like providing the explanations to the questions, so you can actually learn as you go. Someone got lazy. Also the end of chapter question drills, which ask up to 20 questions, provide neither the answer OR the explanation key so you can check yourself; you have to dig through the text. End of chapter quizzes are really good learning tools, but these ones make you work too hard, and waste your time by making you hunt down the correct answers in a chapter you just read. They could at least give the answers, even if they are too lazy to provide the explanations. So, as an exam prep book, this one really falls down on its face in that area. I hate to criticize this fine book, but for almost 100.00 these overpriced Course Technology books should be doing better than this.
It is a good book as far as the text and layout go, very readable and enjoyable. But unless you need it for a class (as is often the case with Course Technology books), save your money and get the Sybex book, or Sybex+something else like the ExamCram and STILL pay less than half what this book costs.
I give it 3 stars. I would have given 5 except for the inexcusable lack of answers/explanations to the end of chapter review questions, the lack of answers/explanations to the Certblaster practice exams, and the insane price.Security+ Guide to Network Security Fundamentals OverviewNow in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Want to learn more information about Security+ Guide to Network Security Fundamentals?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Metasploit: The Penetration Tester's Guide Review

Metasploit: The Penetration Tester's Guide
Average Reviews:

(More customer reviews)
Are you looking to buy Metasploit: The Penetration Tester's Guide? Here is the right place to find the great deals. we can offer discounts of up to 90% on Metasploit: The Penetration Tester's Guide. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Metasploit: The Penetration Tester's Guide ReviewIt's nice when a book not only delivers on its stated objective, but it also opens my eyes to a better understanding of a related subject. Metasploit: The Penetration Tester's Guide by David Kennedy, Jim O'Gorman, Devon Kerns, and Mati Aharoni falls solidly into that class. In addition to learning how I can use Metasploit for network penetration testing, I also saw just how easy it is for someone to compromise a system with very little effort or knowledge. You can never rest when it comes to network and system security.
Contents:
Introduction; The Absolute Basics of Penetration Testing; Metasploit Basics; Intelligence Gathering; Vulnerability Scanning; The Joy of Exploitation; Meterpreter; Avoiding Detection; Exploitation Using Client-Side Attacks; Metasploit Auxiliary Modules; The Social-Engineer Toolkit; Fast-Track; Karmetasploit; Building Your Own Module; Creating Your Own Exploits; Porting Exploits to the Metasploit Framework; Meterpreter Scripting; Simulated Penetration Testing; Configuring Your Target Machines; Cheat Sheet; Index
The authors set an ambitious goal in trying to write a book that is useful for both beginners and experienced users of Metasploit. Usually that means that neither side ends up being happy. I can say as a member of the beginner group, I can say they were successful on that end of the scale. There's a fine balance between step-by-step hand holding and the assumption that the reader already knows everything. After an introduction to a structured approach to penetration testing, they start to cover the basics of how someone might use Metasploit to probe a network, gather information on potential attack vectors, and then exploit those potential weaknesses. The major features are covered as opposed to trying to write about every last setting, so the material doesn't bog down in minutia. It's also nice that they set up a fictional penetration test scenario, and follow it through the different chapters. It makes for good continuity. As the book progresses, the emphasis moves towards creating your own modules to run within the Metasploit framework. Not every tester will need or want to go that route, but it's a reminder of how flexible this tool can be.
The bonus of this book was realizing how easy it is to launch various attacks without much effort. I guess I really hadn't thought through what would be necessary to set up phishing attacks, either by sending infected documents or setting up a fake site to collect personal information. With Metasploit, it's nothing more than selecting some options and running the tool. You can argue whether Metasploit is a good or bad thing depending on who is using it, but it's a certainty that this type of behavior will exist and happen regardless. By writing this book, the authors have helped even the playing field between the black hats and the white hats.
Metasploit: The Penetration Tester's Guide is a book that should be on the shelf of any serious computer security professional. And if you're just starting to dabble in the world of network security, this is a great resource to start your journey.
Disclosure:
Obtained From: Publisher
Payment: FreeMetasploit: The Penetration Tester's Guide Overview"The best guide to the Metasploit Framework." -HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.

Learn how to:

Find and exploit unmaintained, misconfigured, and unpatched systems
Perform reconnaissance and find valuable information about your target
Bypass anti-virus technologies and circumvent security controls
Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
Use the Meterpreter shell to launch further attacks from inside the network
Harness standalone Metasploit utilities, third-party tools, and plug-ins
Learn how to write your own Meterpreter post exploitation modules and scripts

You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.


Want to learn more information about Metasploit: The Penetration Tester's Guide?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...

Managing Security with Snort and IDS Tools Review

Managing Security with Snort and IDS Tools
Average Reviews:

(More customer reviews)
Are you looking to buy Managing Security with Snort and IDS Tools? Here is the right place to find the great deals. we can offer discounts of up to 90% on Managing Security with Snort and IDS Tools. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Managing Security with Snort and IDS Tools ReviewThis is basically a book about intrusion detection using all open source tools. It starts with an introductory chapter that explains the problem of defining an intrusion and why it is becoming more and more of a problem. It follows up with a chapter on network traffic analysis including packet sniffing and using tcpdump and ethereal. Then comes the meat of the text - installing Snort. Of course to really understand how to use Snort you have to understand how attacks occur and the common methods used. The authors provide a really nice chapter on this subject. After that come five chapters on configuring, deploying, and managing Snort rules, intrusion prevention strategies, and tuning. Once Snort is up and running the authors examine the use of ACID and SnortCenter as Snort IDS management consoles. Either of these products drastically decreases the burden of analyzing what has happened and is happening on the intrusion detection forefront. The book ends with additional tools for Snort IDS management and implementation strategies for high-bandwidth situations.
There are other very good books on Snort but one of the things that makes this one particularly valuable is that it also looks at other open source tools and provides a good basic background on intrusion detection theory. Managing Security with Snort and IDS Tools is highly recommended for those in charge of intrusion detection and prevention in a network environment and planning to implement a system their self.Managing Security with Snort and IDS Tools Overview
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.

Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use?How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?

Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools.This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs.

Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.

Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts.

Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.


Want to learn more information about Managing Security with Snort and IDS Tools?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...