Qty:1
  • List Price: $49.99
  • Save: $4.85 (10%)
Only 2 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Used: Like New | Details
Sold by Bookywoman
Condition: Used: Like New
Comment: Appears never used.
Access codes and supplements are not guaranteed with used items.
Add to Cart
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Open Source Security Tools: Practical Guide to Security Applications, A Paperback – August 8, 2004

ISBN-13: 078-5342194432 ISBN-10: 0321194438

Buy New
Price: $45.14
32 New from $19.98 33 Used from $2.50
Amazon Price New from Used from
Paperback
"Please retry"
$45.14
$19.98 $2.50

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Open Source Security Tools: Practical Guide to Security Applications, A + Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network
Price for both: $78.12

Buy the selected items together

Customers Who Bought This Item Also Bought

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 608 pages
  • Publisher: Prentice Hall (August 8, 2004)
  • Language: English
  • ISBN-10: 0321194438
  • ISBN-13: 978-0321194435
  • Product Dimensions: 9.4 x 7.1 x 1.2 inches
  • Shipping Weight: 2.2 pounds (View shipping rates and policies)
  • Average Customer Review: 4.1 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Best Sellers Rank: #1,597,208 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. Seasoned security expert Tony Howlett has reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the “best of breed” for all major areas of information security.

Inside, you’ll find everything from how to harden Linux and Windows systems to how to investigate breaches with Sleuth Kit, Autopsy Forensic Browser, and Forensic Tool Kit. For each security task described, the author reviews the best open source tools and how to use them and also provides a case study and sample implementation. Covered tasks include:

  • Installing an open source firewall using Ipchains, Iptables, Turtle firewall, or Smoothwall
  • Scanning ports and testing for vulnerabilities using Nmap, Nlog, Nmap for Windows, Nessus,and NessusWX
  • Using sniffers and network-intrusion systems, including Tcpdump, Ethereal, Windump, Snort™, and Snort™ for Windows
  • Tracking and analyzing collected data with Swatch, ACID, and NCC
  • Encrypting communications with PGP, GnuPG, SSH, and Free S/WAN

This handy reference also tackles the emerging field of wireless security and covers tools such as Kismet Wireless, Airsnort, and Netstumber.

About the Author

Tony Howlett is the president of Network Security Services, a computer-security application service provider built entirely on open source software. A Certified Information Systems Security Professional (CISSP) and GIAC Systems and Network Auditor (GNSA), he has fourteen years of experience, including running a major regional ISP/CLEC and building a nationwide ATM/DSL network. Mr. Howlett is a frequent speaker on computer security and technology topics and has written for SysAdmin, Computer Currents, Windows Web Solutions, Security Administrator, and other magazines.




More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.1 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

3 of 3 people found the following review helpful By shuumai on March 3, 2005
Format: Paperback
This book provides a good overview of security tools. It could help readers get started by explaining security concepts and stepping the reader through installation of useful tools. (The book includes a CD containing the utilities covered in the text.) It doesn't however, give good coverage to interpreting the results of scans and monitoring.

About 1/4 to 1/3 of the book is wasted on appendices of readily available information. GPL and BSD licenses, well-known port numbers, and a huge list of Nessus plug-ins. The space might have been better utilized by providing coverage of virus scanners or even common application alternatives that are more resistant to attack. On the positive side, the information is there so you won't need to look for it on the Web.

I like the fact that the book covers utilities for both Linux and Windows. And the fact that the utilities are free and Open Source, of course. Just using one of the utilities covered in the book would save you many times the cost of the book.

I learned a few new tricks from this book even though I was already familiar with many of the utilities and concepts.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Bookreader1000 on December 31, 2004
Format: Paperback
This book is an excellent resource to help readers understand what open source tools are available to address every dimension of securing a computing infrastructure.

What I liked best about this book is that it did not assume an already-existing base of knowledge in the reader. Other books present information that assumes the reader already understands the topic, and therefor only needs the details of how to use the tool being discussed. Howlett's book provides a graduated discussion of every area, enabling a beginner to start from scratch and an experienced reader to glean the important details.

Also outstanding about this book is the fact that it covers pretty much all the areas of security an admin will need to address. If you work through this book, you can be pretty sure that you've covered all your bases.

Because of that, the book is like a survey, rather than an exhaustive discussion of any one area. However, the author always provides pointers to other places the reader can go for deeper material. I think this is a great way to organize material and really enjoyed the book because of it.

Overall, this is a great contribution to a critical area of computing.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Atillla Ozgur on December 20, 2004
Format: Paperback
I consider myself a developer rather than system admin. But I enjoyed and learned quite a bit. I read this book in one 7 hours bus journey. It is very good on introducing new topics. It teaches you how to use programs and give recommandations.

I think my money is well spent.

Think it, this way. When you start to learn something new, you are bombarded with a lot of buzzwords and jargon. This book will teach you most of this buzzwords and you will learn quite a lot in reading this book. A internet search about tools will bring you more similar tools and new learning points.

As I said in the title, this books is about beginners. If you are a expert, I do not think you will gain a lot from this book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By W Boudville HALL OF FAMETOP 1000 REVIEWERVINE VOICE on August 15, 2004
Format: Paperback
Howlett spans both the unix/linux and Microsoft worlds in his offering of free, open source security programs. There really is a surprising amount of reliable, free packages out there, for you to bolt down your network. He shows this at the book's start, with a simple but very convenient table of tools, like Ethereal, finger, OpenSSH, PGP, Snort and traceroute. Many others are also listed. Several are available on both operating systems. Here, I consider all the unix/linux OSs as one, and likewise with Microsoft.

The book can be regarded as a buildout of the table. Explaining each tool's best usage, with examples and screen captures. But Howlett offers more than just an encyclopaediac reference approach to the tools. That's more of a bottoms-up outlook. The book has a top-down view that starts with high level topics like firewalls and network sniffers and suggests how to understand the salient points. And thence use some tools optimised for these.

In passing, when he talks about why a cracker might want to break into your system, even if you have nothing in it worthwhile to her, he understates the danger. If you have a machine with a broadband connection, then a cracker has an economic incentive to take it over. She can use it to transmit spam (especially the phishing variety) to other, larger networks. Because open relays are getting closed up, to prevent spam, then some spammers are resorting to creating their own open relays, in this fashion. Howlett describes her using your system for DDOS attacks. But spam injection is actually a better reason, inasmuch as she can make money from this. Of course, this scarcely invalidates his text. If anything, it increases the need for it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
4 of 5 people found the following review helpful By Jack D. Herrington on August 16, 2004
Format: Paperback
This thick security tome is a practical guide to security that seems ideally suited to systems administrators. There is a brief introduction to general security issues, then eleven chapters that cover tools and techniques. These include packet sniffing, data encryption, wireless security. An overall soup to nuts guide to practical security.

This book doesn't go from computer science theory and architecture, it starts with descriptions of the problems very close to the metal (often times showing packet layouts), and then covers point by point use of open source software to fix the holes.

The text is well written, if a little stiff, and the graphic are not overused but are not as sparse as O'Reilly. I recommend this book for Systems Administrators looking for a step by step guide to using open source security tools.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search