- Paperback: 608 pages
- Publisher: Prentice Hall (August 8, 2004)
- Language: English
- ISBN-10: 0321194438
- ISBN-13: 978-0321194435
- Product Dimensions: 7 x 1.5 x 8.9 inches
- Shipping Weight: 2.2 pounds (View shipping rates and policies)
- Average Customer Review: 4.1 out of 5 stars See all reviews (11 customer reviews)
- Amazon Best Sellers Rank: #817,896 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Open Source Security Tools: Practical Guide to Security Applications, A
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently Bought Together
From the Back Cover
Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.
Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction to open source security tools. Seasoned security expert Tony Howlett has reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the “best of breed” for all major areas of information security.
Inside, you’ll find everything from how to harden Linux and Windows systems to how to investigate breaches with Sleuth Kit, Autopsy Forensic Browser, and Forensic Tool Kit. For each security task described, the author reviews the best open source tools and how to use them and also provides a case study and sample implementation. Covered tasks include:
- Installing an open source firewall using Ipchains, Iptables, Turtle firewall, or Smoothwall
- Scanning ports and testing for vulnerabilities using Nmap, Nlog, Nmap for Windows, Nessus,and NessusWX
- Using sniffers and network-intrusion systems, including Tcpdump, Ethereal, Windump, Snort™, and Snort™ for Windows
- Tracking and analyzing collected data with Swatch, ACID, and NCC
- Encrypting communications with PGP, GnuPG, SSH, and Free S/WAN
This handy reference also tackles the emerging field of wireless security and covers tools such as Kismet Wireless, Airsnort, and Netstumber.
About the Author
Tony Howlett is the president of Network Security Services, a computer-security application service provider built entirely on open source software. A Certified Information Systems Security Professional (CISSP) and GIAC Systems and Network Auditor (GNSA), he has fourteen years of experience, including running a major regional ISP/CLEC and building a nationwide ATM/DSL network. Mr. Howlett is a frequent speaker on computer security and technology topics and has written for SysAdmin, Computer Currents, Windows Web Solutions, Security Administrator, and other magazines.
Top Customer Reviews
The book can be regarded as a buildout of the table. Explaining each tool's best usage, with examples and screen captures. But Howlett offers more than just an encyclopaediac reference approach to the tools. That's more of a bottoms-up outlook. The book has a top-down view that starts with high level topics like firewalls and network sniffers and suggests how to understand the salient points. And thence use some tools optimised for these.
In passing, when he talks about why a cracker might want to break into your system, even if you have nothing in it worthwhile to her, he understates the danger. If you have a machine with a broadband connection, then a cracker has an economic incentive to take it over. She can use it to transmit spam (especially the phishing variety) to other, larger networks. Because open relays are getting closed up, to prevent spam, then some spammers are resorting to creating their own open relays, in this fashion. Howlett describes her using your system for DDOS attacks. But spam injection is actually a better reason, inasmuch as she can make money from this. Of course, this scarcely invalidates his text. If anything, it increases the need for it.
What I liked best about this book is that it did not assume an already-existing base of knowledge in the reader. Other books present information that assumes the reader already understands the topic, and therefor only needs the details of how to use the tool being discussed. Howlett's book provides a graduated discussion of every area, enabling a beginner to start from scratch and an experienced reader to glean the important details.
Also outstanding about this book is the fact that it covers pretty much all the areas of security an admin will need to address. If you work through this book, you can be pretty sure that you've covered all your bases.
Because of that, the book is like a survey, rather than an exhaustive discussion of any one area. However, the author always provides pointers to other places the reader can go for deeper material. I think this is a great way to organize material and really enjoyed the book because of it.
Overall, this is a great contribution to a critical area of computing.
About 1/4 to 1/3 of the book is wasted on appendices of readily available information. GPL and BSD licenses, well-known port numbers, and a huge list of Nessus plug-ins. The space might have been better utilized by providing coverage of virus scanners or even common application alternatives that are more resistant to attack. On the positive side, the information is there so you won't need to look for it on the Web.
I like the fact that the book covers utilities for both Linux and Windows. And the fact that the utilities are free and Open Source, of course. Just using one of the utilities covered in the book would save you many times the cost of the book.
I learned a few new tricks from this book even though I was already familiar with many of the utilities and concepts.
I think my money is well spent.
Think it, this way. When you start to learn something new, you are bombarded with a lot of buzzwords and jargon. This book will teach you most of this buzzwords and you will learn quite a lot in reading this book. A internet search about tools will bring you more similar tools and new learning points.
As I said in the title, this books is about beginners. If you are a expert, I do not think you will gain a lot from this book.
This book doesn't go from computer science theory and architecture, it starts with descriptions of the problems very close to the metal (often times showing packet layouts), and then covers point by point use of open source software to fix the holes.
The text is well written, if a little stiff, and the graphic are not overused but are not as sparse as O'Reilly. I recommend this book for Systems Administrators looking for a step by step guide to using open source security tools.
Most Recent Customer Reviews
Great shape, great price, great content.
Bought this to sharpen up the internal network we use ourselves at the office.
The book covers many security tools available for UNIX, Linux and Windows. My only complaint is that the book refers to a CD ROM with the tools on it which was not included. Read morePublished on June 20, 2013 by Amazon Customer
This book is now classified by the publisher as "out of print" and this is a reprint. I just got off the phone with Prentice Hall, and the CD-ROM does NOT come with the book,... Read morePublished on February 6, 2006 by R.K. Dyer
Title: Open Source Security Tools
Author: Tony Howlett
Publisher: Prentice Hall
Reviewer: Gary... Read more
Tony Howlett has created a tome that is as valuable to the average overworked System Administrator as the Swiss Army knife was to McGyver. Read morePublished on October 2, 2004 by Decoleur