tailieunhanh - Open Source Security Tools : Practical Guide to Security Applications part 59

Open Source Security Tools : Practical Guide to Security Applications part 59. Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. | Page 559 Thursday June 24 2004 3 47 PM Index 3Com 165 100 percent outsourced IT 20 wireless standards 318 347 A ACID Analysis Console for Intrusion Databases 2 201 246 ADOdb 247 analyzing alert data 255 archiving alerts 258 ARIN lookup 256 carefully using names 259 categorizing alerts 253 common IP destination addresses 255 configuration page 251 configuring 250-251 daily use 256-257 GD 248 graphing data 257-258 information on alert types 253-254 installing 249-250 introduction to using 251-252 IP source address 255-256 JpGraph 247-248 main page 251 narrowing search criteria 252 overall statistics on database 251-252 PHPLOT 247 reverse DNS lookup 255-256 Sam Spade search 256 sensitive data 254 service being attacked most 256 Snort sensors 248 sorting alerts 254 SQL databases 247 statistics on AG alert group 252 summary information on database AG alert group 252 tuning and managing NIDS 253-254 variables for configuring 250-251 Web servers 247 ACID database maintaining 258 file 250 Ad-hoc mode 317 Adleman Leonard 282 ADOdb 247 ADOdb Web site 247 AeroSniff 335 AES 284 Afind utility 376 AH Authentication Header 285-286 AirCERT 247 Airjack 343 AirSnort 335 346 Anomalous IDS intrusion detection system 194-195 Anonymous Internet access 320 Antennas 324 Anti-virus software 7 12 AP access point 317-319 Apache Web servers xi 22 244-245 NCC Nessus Command Center 267 PHP 261 Apache Web site 244 AppleTalk 164 Application layer 57 121-122 Application ports 2 Applications exposing systems to vulnerability 121 getting data 57 on high port numbers 90 port numbers 88-89 testing for security holes 122 Arcnet 164 ARIN lookup 256 Armed forces 352 ARP Address Resolution Protocol 59 166 Asymmetric cryptography 281-282 AT T 13 Attacks coming through firewalls 194 filing criminal charges 350-351 repeated evidence of 355 Authentication 284 autopsy directory 369 Autopsy Forensic Browser 368-370 Auto-rooters 9 Availability 5 Awk 13 559 .

TỪ KHÓA LIÊN QUAN