Picture 1 of 2
Picture 1 of 2
LINUX FIREWALLS Attack Detection And Response With Iptables Psad Fwsnort By RASH
US $25.00
Approximately£18.87
Condition:
Good
A book that has been read, but is in good condition. Minimal damage to the book cover eg. scuff marks, but no holes or tears. If this is a hard cover, the dust jacket may be missing. Binding has minimal wear. The majority of pages are undamaged with some creasing or tearing, and pencil underlining of text, but this is minimal. No highlighting of text, no writing in the margins, and no missing pages. See the seller’s listing for full details and description of any imperfections.
Postage:
Free USPS Media MailTM.
Located in: Olivehurst, California, United States
Delivery:
Estimated between Wed, 25 Sep and Mon, 30 Sep to 43230
Returns:
No returns accepted.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:403921820730
Item specifics
- Condition
- Book Title
- Linux Firewalls: Attack Detection and Response with iptables,
- ISBN-10
- 1593271417
- UPC
- 689145714173
- ISBN
- 9781593271411
- Subject Area
- Computers
- Publication Name
- Linux Firewalls : Attack Detection and Response
- Publisher
- No Starch Press, Incorporated
- Item Length
- 9.2 in
- Subject
- Operating Systems / Linux, Security / Online Safety & Privacy, Security / General, Security / Networking
- Publication Year
- 2007
- Type
- Textbook
- Format
- Perfect
- Language
- English
- Item Height
- 0.8 in
- Features
- New Edition
- Item Weight
- 23.1 Oz
- Item Width
- 7.1 in
- Number of Pages
- 336 Pages
About this product
Product Identifiers
Publisher
No Starch Press, Incorporated
ISBN-10
1593271417
ISBN-13
9781593271411
eBay Product ID (ePID)
57159365
Product Key Features
Number of Pages
336 Pages
Language
English
Publication Name
Linux Firewalls : Attack Detection and Response
Publication Year
2007
Subject
Operating Systems / Linux, Security / Online Safety & Privacy, Security / General, Security / Networking
Features
New Edition
Type
Textbook
Subject Area
Computers
Format
Perfect
Dimensions
Item Height
0.8 in
Item Weight
23.1 Oz
Item Length
9.2 in
Item Width
7.1 in
Additional Product Features
Intended Audience
Trade
LCCN
2006-026679
Dewey Edition
22
Reviews
"If you're building a Linux firewall and want to know what all the bells and whistles are, when you might want to set them off, and how to hook them together, here you go." --;login "This admirable, eminently usable text goes much further than advertised." --Linux User and Developer, Issue 77 "If you run one or more Linux based firewalls, this book will not only help you to configure them securely, it will help you understand how they can be monitored to discover evidence of probes, abuse and denial of service attacks. Readers of this book will gain an understanding of firewall log analysis and how the netfilter firewall can be dramatically enhanced with several open source tools." --Ron Gula, CTO & Co-Founder of Tenable Network Security "The book is easy to read, and chock full of attack vectors and subtle (and not so subtle) iptables configuration tips. This well researched book heightens an average system administrator's awareness to the vulnerabilities in his or her infrastructure, and the potential to find hardening solutions." --Free Software Magazine "Right from the start, the book presented valuable information and pulled me in. Each of the central topics were thoroughly explained in an informative, yet engaging manner. Essentially, I did not want to stop reading. Rating: 9/10" --Slashdot "One of the main reasons Linux Firewalls is a great book is that Mike Rash is an excellent writer. I've read (or tried to read) plenty of books that seemed to offer helpful content, but the author had no clue how to deliver that content in a readable manner. Linux Firewalls makes learning network security an enjoyable experience." --Richard Bejtlich, Tao Security "What really makes this book different from the others I've seen over the years is that the author approaches the subject in a layered method while exposing potential vulnerabilities at each step. (Thank you so VERY much.) So for those that are new to the security game, the book also takes a stab at teaching the basics of network security while teaching you the tools to build a modern firewall." --InfoWorld "Linux Firewalls is a great resource. It provided insight and helpful information into additional tools to get the most out of iptables and to add in additional functionality." --tuxmachines.org "If you or anyone you know is responsible for keeping a secure network, Linux Firewalls is an invaluable resource to have by your side. You will gain a better understanding of attacks, how to use iptables, PSAD, and fwsnort - all in an effort to properly defend and respond to attempted compromises." --LinuxSecurity.com "Michael does a great job of explaining not just how iptables works, but he shows how users gain operational value from using open source tools and techniques, such as visualization, to analyze firewall logs." --Raffael Marty, SecViz
Illustrated
Yes
Dewey Decimal
005.8
Edition Description
New Edition
Table Of Content
Foreword by Richard Bejtlich Introduction Chapter 1: Care and Feeding of iptables Chapter 2: Network Layer Attacks and Defense Chapter 3: Transport Layer Attacks and Defense Chapter 4: Application Layer Attacks and Defense Chapter 5: Introducing psad: The Port Scan Attack Detector Chapter 6: psad Operations: Detecting Suspicious Traffic Chapter 7: Advanced psad Topics: From Signature Matching to OS Fingerprinting Chapter 8: Active Response with psad Chapter 9: Translating Snort Rules into iptables Rules Chapter 10: Deploying Fwsnort Chapter 11: Combining psad and Fwsnort Chapter 12: Port-Knocking vs. Single Packet Authorization Chapter 13: Introducing fwknop Chapter 14: Visualizing iptables Logs Appendix A: Attack Spoofing Appendix B: A Complete fwsnort Script
Synopsis
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics: P, System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. "Linux Firewalls" discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics: Passive network authentication and OS fingerprinting iptables log analysis and policies Application layer attack detection with the iptables string match extension Building an iptables ruleset that emulates a Snort ruleset Port knocking vs. Single Packet Authorization (SPA) Tools for visualizing iptables logs Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises., The Netfilter firewall built into Linux provides capabilities that rival many commercial firewalls. Netfilter: Intrustion Detection and Response explores using Netfilter as an intrusion detection system (IDS) to create a highly secure network. The book discusses passive network authentication; Netfilter log analysis and policies; exploit ......, System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack. Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop. Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics: Passive network authentication and OS fingerprinting iptables log analysis and policies Application layer attack detection with the iptables string match extension Building an iptables ruleset that emulates a Snort ruleset Port knocking vs. Single Packet Authorization (SPA) Tools for visualizing iptables logs Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises., The Netfilter firewall built into Linux provides capabilities that rival many commercial firewalls. Netfilter: Intrustion Detection and Response explores using Netfilter as an intrusion detection system (IDS) to create a highly secure network. The book discusses passive network authentication; Netfilter log analysis and policies; exploit packet traces and Snort ruleset emulation with Netfilter rules; and more. Perl and C code snippets are included to help readers maximize the effectiveness of Netfilter., The Netfilter firewall built into Linux provides capabilities that rival many commercial firewalls. Providing concrete examples to illustrate concepts, this new reference explores using Netfilter as an intrusion detection system (IDS) by combining it with Snort rule sets and custom software available from the author's site, cipherdyne.org.
LC Classification Number
QA76.9.A25R36 2007
Item description from the seller
Business seller information
Naiyoon Chao
Michael Largent
, CA
United States
I certify that all my selling activities will comply with all EU laws and regulations.
Registered as a business seller
Seller Feedback (5,280)
- h***t (775)- Feedback left by buyer.Past 6 monthsVerified purchaseItem as described, super quick shipping, would buy from again. Thanks!!!NWT FOREIGN EXCHANGE Forever 21 Velvet Sweetheart Fit & Flare Skater Dress M (#404039463999)
- p***p (202)- Feedback left by buyer.Past monthVerified purchaseA+++++ ! Fast shipping…. Thanks so very much!
- s***n (1449)- Feedback left by buyer.Past monthVerified purchaseA+ transaction!
Product ratings and reviews
More to explore:
- True Detective Magazines,
- Linux Non-Fiction Paperback Fiction & Books,
- Non-Fiction Linux Fiction & Non-Fiction Books,
- April True Detective Magazines,
- May True Detective Magazines,
- True Detective Magazines in English,
- Attack on Titan Manga & Asian Comic Book Single Volume,
- Master Detective Magazine Monthly Magazines,
- Monthly Magazines in English Master Detective Magazine,
- Fiction Detective Stories Fiction & Non-Fiction Books