Host Integrity Monitoring Using Osiris and Samhain

Author:   Brian Wotring
Publisher:   Syngress Media,U.S.
ISBN:  

9781597490184


Pages:   450
Publication Date:   25 July 2005
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $123.95 Quantity:  
Add to Cart

Share |

Host Integrity Monitoring Using Osiris and Samhain


Add your own review!

Overview

This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments. Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy.

Full Product Details

Author:   Brian Wotring
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Dimensions:   Width: 15.20cm , Height: 2.30cm , Length: 22.90cm
Weight:   0.730kg
ISBN:  

9781597490184


ISBN 10:   1597490180
Pages:   450
Publication Date:   25 July 2005
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   No Longer Our Product
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Chapter 1: Fundamentals; Chapter 2: Understanding The Terrain In order to be effective at understanding what to monitor; Chapter 3: Threats; Chapter 4: Planning The key to obtaining the most out of the adoption of host integrity tools; Chapter 5: Osiris; Chapter 6: Samhain; Chapter 7: Analysis and Response; Appendix A: Monitoring Linksys Devices Appendix B: Advanced Strategies

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List