REVIEW: "Open Source Security Tools", Tony Howlett

Discussion in 'Computer Security' started by Rob Slade, doting grandpa of Ryan and Trevor, Jan 28, 2005.

  1. BKOPSOST.RVW 20041203

    "Open Source Security Tools", Tony Howlett, 2005, 0-321-19443-8,
    U$49.99/C$71.99
    %A Tony Howlett
    %C One Lake St., Upper Saddle River, NJ 07458
    %D 2005
    %G 0-321-19443-8
    %I Prentice Hall
    %O U$49.99/C$71.99 +1-201-236-7139 fax: +1-201-236-7131
    %O http://www.amazon.com/exec/obidos/ASIN/0321194438/robsladesinterne
    http://www.amazon.co.uk/exec/obidos/ASIN/0321194438/robsladesinte-21
    %O http://www.amazon.ca/exec/obidos/ASIN/0321194438/robsladesin03-20
    %O tl a rl 2 tc 3 ta 3 tv 2 wq 2
    %P 578 p. + CD-ROM
    %T "Open Source Security Tools"

    The tools listed in this book are for network security, almost without
    exception. The preface states that the book is intended primarily for
    systems administrators, although security professionals may find
    useful information as well. Howlett makes an effort to include items
    that have Windows versions, although only about a third do. He has
    also included tutorial materials on detailed aspects of the TCP/IP
    protocols that have a bearing on the operation of security software.

    Chapter one outlines the open source concept, starting with a fairly
    idealized scenario, but continuing with some history, advantages (and
    disadvantages), and a brief look at two of the major open source
    licences. The nominal topic of chapter two is operating systems, and
    so it is rather odd that most of the tools described are network
    utilities. However, the descriptions are better than are given in
    most reviews of software tools, and the details are clear for all who
    may read them. While chapter three does provide a quick overview of
    TCP/IP and filtering, it does not cover the full range of firewall
    types. The programs listed are comprehensively described in terms of
    installation and administration commands. Port scanning is covered in
    chapter four, and, again, while the programs are explained well, other
    details, such as the services that would need to be turned off to
    reduce the danger of open ports, are not. Much the same can be said
    about the discussion of vulnerability scanners, in chapter five.

    Chapter six looks at the most widely used network sniffers. The
    concepts behind, and examples of, both network- and host-based
    intrusion detection systems are given in chapter seven. Logging and
    audit data can accumulate quickly and overwhelm the administrator, so
    chapter eight reviews some common tools to present, analyse, and
    manage the information. Chapter nine lists a variety of encryption
    tools. Wireless tools, primarily for finding networks, are given in
    chapter ten. Forensic tools are examined in chapter eleven, but there
    may not be a sufficient distinction made between the network and data
    recovery tools. Chapter twelve finishes off with some more general
    discussion about open source software, and where to find it.

    There are some helpful appendices: well-known TCP/IP port numbers, and
    a large list of plug-ins for Nessus.

    The tutorial material could have had more depth and care, but there is
    no denying the value of the compilation (particularly with all the
    software included on the CD).

    copyright Robert M. Slade, 2004 BKOPSOST.RVW 20041203

    --
    ======================

    ============= for back issues:
    [Base URL] site http://victoria.tc.ca/techrev/
    or mirror http://sun.soci.niu.edu/~rslade/
    CISSP refs: [Base URL]mnbksccd.htm
    Security Dict.: [Base URL]secgloss.htm
    Book reviews: [Base URL]mnbk.htm
    Review mailing list: send mail to
    or
     
    Rob Slade, doting grandpa of Ryan and Trevor, Jan 28, 2005
    #1
    1. Advertising

  2. Rob Slade, doting grandpa of Ryan and Trevor

    Guest

    Any good links to this book?

     
    , Feb 13, 2005
    #2
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Silverstrand

    HEXUS.interview: Tony Riccardi, Mesh General Manager

    Silverstrand, Jul 27, 2005, in forum: Front Page News
    Replies:
    0
    Views:
    754
    Silverstrand
    Jul 27, 2005
  2. Silverstrand

    Interview with Tony Bove

    Silverstrand, Oct 17, 2005, in forum: Front Page News
    Replies:
    0
    Views:
    620
    Silverstrand
    Oct 17, 2005
  3. ragz

    tony's prob

    ragz, Dec 31, 2003, in forum: Computer Support
    Replies:
    1
    Views:
    470
  4. Scottie

    Tony and his Cronies must GO!

    Scottie, Jun 3, 2004, in forum: Computer Support
    Replies:
    6
    Views:
    517
    ROBBIE
    Jun 4, 2004
  5. Jayne

    For Swiss Tony & Mike

    Jayne, Jun 23, 2004, in forum: Computer Support
    Replies:
    9
    Views:
    475
    Paul - xxx the slave trader
    Jun 24, 2004
Loading...

Share This Page