Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "Open Source Security Tools", Tony Howlett

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKOPSOST.RVW 20041203 Open Source Security Tools , Tony Howlett, 2005, 0-321-19443-8, U$49.99/C$71.99 %A Tony Howlett tony@howlett.org %C One Lake St.,
    Message 1 of 1 , Jan 28, 2005
      BKOPSOST.RVW 20041203

      "Open Source Security Tools", Tony Howlett, 2005, 0-321-19443-8,
      %A Tony Howlett tony@...
      %C One Lake St., Upper Saddle River, NJ 07458
      %D 2005
      %G 0-321-19443-8
      %I Prentice Hall
      %O U$49.99/C$71.99 +1-201-236-7139 fax: +1-201-236-7131
      %O http://www.amazon.com/exec/obidos/ASIN/0321194438/robsladesinterne
      %O http://www.amazon.ca/exec/obidos/ASIN/0321194438/robsladesin03-20
      %O tl a rl 2 tc 3 ta 3 tv 2 wq 2
      %P 578 p. + CD-ROM
      %T "Open Source Security Tools"

      The tools listed in this book are for network security, almost without
      exception. The preface states that the book is intended primarily for
      systems administrators, although security professionals may find
      useful information as well. Howlett makes an effort to include items
      that have Windows versions, although only about a third do. He has
      also included tutorial materials on detailed aspects of the TCP/IP
      protocols that have a bearing on the operation of security software.

      Chapter one outlines the open source concept, starting with a fairly
      idealized scenario, but continuing with some history, advantages (and
      disadvantages), and a brief look at two of the major open source
      licences. The nominal topic of chapter two is operating systems, and
      so it is rather odd that most of the tools described are network
      utilities. However, the descriptions are better than are given in
      most reviews of software tools, and the details are clear for all who
      may read them. While chapter three does provide a quick overview of
      TCP/IP and filtering, it does not cover the full range of firewall
      types. The programs listed are comprehensively described in terms of
      installation and administration commands. Port scanning is covered in
      chapter four, and, again, while the programs are explained well, other
      details, such as the services that would need to be turned off to
      reduce the danger of open ports, are not. Much the same can be said
      about the discussion of vulnerability scanners, in chapter five.

      Chapter six looks at the most widely used network sniffers. The
      concepts behind, and examples of, both network- and host-based
      intrusion detection systems are given in chapter seven. Logging and
      audit data can accumulate quickly and overwhelm the administrator, so
      chapter eight reviews some common tools to present, analyse, and
      manage the information. Chapter nine lists a variety of encryption
      tools. Wireless tools, primarily for finding networks, are given in
      chapter ten. Forensic tools are examined in chapter eleven, but there
      may not be a sufficient distinction made between the network and data
      recovery tools. Chapter twelve finishes off with some more general
      discussion about open source software, and where to find it.

      There are some helpful appendices: well-known TCP/IP port numbers, and
      a large list of plug-ins for Nessus.

      The tutorial material could have had more depth and care, but there is
      no denying the value of the compilation (particularly with all the
      software included on the CD).

      copyright Robert M. Slade, 2004 BKOPSOST.RVW 20041203

      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      E Pluribus Modem
      http://victoria.tc.ca/techrev or http://sun.soci.niu.edu/~rslade
    Your message has been successfully submitted and would be delivered to recipients shortly.