Книга: Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty «How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat)»

How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat)

Производитель: "Неизвестный"

The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of... ISBN:1597491705

Издательство: "Неизвестный" (2007)

ISBN: 1597491705

Michael Gregg

Michael Gregg is an American computer security specialist, noted speaker at security related events, and an author/coauthor of multiple books such as Build Your Own Network Security Lab and Inside Network Security Assessment [1] He is CEO of Superior Solutions, Inc.

Contents

Biography

Gregg holds two associate’s degrees, a bachelor’s degree, and a master’s degree.[2] Gregg’s certifications include CISSP and CISA. Gregg has been quoted in newsprint and featured on various television and radio shows including, NPR, The New York Times, ABC, CBS,[3] Fox TV[4] and others discussing cybersecurity and ethical hacking. He is the lead faculty member for Villanova University's online Cyber Security program.[5]

President of Superior Solutions, Inc., a Houston-based security assessment and training firm, Mr. Gregg has more than 20 years of experience in the IT field. He has earned more than 20 certifications, including CISSP®, MCSE, CCNA®, CTT+™, CIW™ Security Analyst, CEH™, NSA IAM, SCNP™ and TICSA. Mr. Gregg has consulted and taught for many Fortune 500 companies. Although consulting consumes the bulk of his time, he also writes for several publications and is the author of “CISSP® Exam Cram 2” and creator of the Assessing IT Infrastructure Vulnerabilities training class. Mr. Gregg holds two associate’s degrees, a bachelor’s degree and a master’s degree.

Publications

Gregg has contributed to the following published works:

Gregg has written articles for print and Internet publications such as:

References

External links

Источник: Michael Gregg

Angela Orebaugh

Angela Orebaugh (1973) is a security technologist, scientist, and author. She is the author of the Syngress' "Wireshark and Ethereal Network Protocol Analyzer Toolkit" and "Ethereal Packet Sniffing". She is also known for her work as a researcher, writer, and speaker for the SANS Institute and as faculty for The Institute for Applied Network Security. She is a frequent speaker at a variety of conferences and security events.

She currently serves as a technology advisor and consultant for commercial and government clients.Fact|date=November 2007 She is a contractor supporting the National Institute of Standards and Technology (NIST), where she is the lead contractor for several security initiatives including the authoring of security specialpublications, the National Vulnerability Database (NVD), Security Content Automation Protocol (SCAP) project, and electronic voting security standards development.

Ms. Orebaugh is a Research Fellow and Adjunct Professor for George Mason University where she performs research and development in information security. At GMU she developed and taught the Intrusion Detection curriculum for the Forensics program in the Department of Electrical and Computer Engineering. Her current research interests include peer-reviewed publications in the areas of intrusion detection and prevention, data mining, attacker profiling, user behavior analysis, and network forensics.

Ms. Orebaugh is known for her work in security architecture design and analysis, perimeter defenseFact|date=November 2007, vulnerability assessmentFact|date=November 2007 and penetration testingFact|date=November 2007, computer forensics, intrusion detection and prevention, and incident handling and responseFact|date=November 2007.

Personal life

Ms. Orebaugh has been active in the information security community since the early 1990s. She holds a Masters degree in Computer Science and a Bachelors degree in Computer Information Systems from James Madison University. She is currently writing her dissertation for her Ph.D. at George Mason University, with a concentration in Information Security. She lives outside of Washington DC.

Published works

Ms. Orebaugh has numerous books and articles published in information security:

Books
*Orebaugh, A. et.al. "Wireshark & Ethereal Network Protocol Analyzer Toolkit", Syngress Publishing, 2006.
*Orebaugh, A., Biles, S., Babbin, J., "Snort Cookbook", OReilly Publishing, ISBN 0596007914, 2005.
*Orebaugh, A., Rash, M., Babbin, J. and Pinkard, B., "Intrusion Prevention and Active Response: Deploying Network and Host IPS", Syngress Publishing, ISBN 193226647X, 2005.
*Orebaugh, A., "Ethereal Packet Sniffing", Syngress Publishing, Boston, MA., ISBN 1932266828, 2004.Journal Papers (refereed)
*Orebaugh, A., "Proactive Forensics", Journal of Digital Forensic Practice, Volume 1, Issue 1, March 2006.Conference Papers (refereed)
*Orebaugh, A. "An Instant Messaging Intrusion Detection System Framework: Using Character Frequency Analysis for Authorship Identification and Validation". IEEE International Carnahan Conference on Security Technology (ICCST). 2006.Invited Talks
*Orebaugh, A. "Deep Packet Inspection", SANS, 2004.
*Orebaugh, A. "The Importance of Information Security Certifications", FISSEA, 2004.
*Orebaugh, A. "Wireless: Ready or Not", NEXPO 2004.Magazine Articles
*Orebaugh, A. and Cole, E., "Intrusion Prevention and Active Response: Implementing an Open Source Defense", SysAdmin Magazine, 2005.
*Orebaugh, A. "Special Report: Cognitive Computing and Machine Learning". IANewsletter. Information Assurance Technology Analysis Center. Volume 6, Number 4. 2004.

External links

* [http://www.securityknox.com/ Securityknox] — home page

Источник: Angela Orebaugh

См. также в других словарях:

  • Mobile operating system — A mobile operating system, also known as a mobile OS, mobile software platform or a handheld operating system, is the operating system that controls a mobile device or information appliance similar in principle to an operating system such as… …   Wikipedia

  • Microsoft Exchange Server — Developer(s) Microsoft Corporation Initial release June 11, 1996 (1996 06 11) Stable release Microsoft Exchange Server 2010 SP1[1] / A …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»