AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Building Open Source Network Security Tools: Components and Techniques

Please fill out form in order to compare prices
Title: Building Open Source Network Security Tools: Components and Techniques
by Mike Schiffman, Mike Schiffman
ISBN: 0-471-20544-3
Publisher: Wiley
Pub. Date: 11 October, 2002
Format: Paperback
Volumes: 1
List Price(USD): $45.00
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 4.29 (21 reviews)

Customer Reviews

Rating: 5
Summary: Refreshing Networking Security material!
Comment: There are many security books on the shelves today. Most of them describe the same hacker tools and methods. They don't get very technical and once you've read one, you've read them all. Building Open Source Network Security Tools is a different breed of security book.

Building Open Source Network Security Tools , just as the name suggests, is about how to build network security tools. This is a technical book, so you are going to have a little knowledge of C and your networking principles. This is definitely not a managers book.

First the book describes some basic principles in developing security software. This is a quick primer in case you have never been involved in software development. Next the book goes on to describe several commonly used libraries like libnet and libpcap. For each library, the structures and functions are explained, then there is sample code. I have written programs using libpcap and libnet before and I still learned something. There is even a section on OpenSSL programming. OpenSSL is a rather large and cryptic, no pun intended, library (in my experience anyways). This book sheds some light on it! These chapters are a great reference to have when making a new security tool.

The author then goes on to explain the several techniques like attack and penetration and active reconnaissance. Not only does the author tell you how they would in a technical sense, he provides code that does it, and explains each piece. This is very useful since most tools in the wild aren't very well commented ;) There is also a chapter on buffer overflows and format string vulnerabilities. These chapters are very well done and do a good job in explaining how they work and how to write code to use them. It may sound like this is an offensive hacker book, but it also gives examples on how to write defensive programs, like a port scan detection tool. At the end of the book the author ties it all together with a large program that utilizes many of the techniques mention in the book.

I found this book to be very refreshing. I had been waiting for a good security programming reference, and this is it. As a part of the Honeynet Project, I have seen a large number of compromises and tools, and one thing I've found is that in order to truly know who your enemy is, and how they operate, you need to know how their tools work. I wish this book had been released years ago when I first became interested in network security. It would have saved me from stumbling around old web pages and dead links. If you're an information security professional, this book is a must have for your library.

Rating: 5
Summary: amazing..must have for anybody who writes networking code
Comment: Even if your focus isn't security, any coder that writes networking code would find this book interesting and hard to put down. In addition to the security information, the book provides in-depth information on low level networking that any coder would find useful. The examples presented shows the reader how to, in a quick and concise way, build almost any network security tool they could imagine. This means that Security professionals no longer need to rely on companies like ISS for their tools. Chapter 10, Attack and Penetration Techniques, is worth the price of the book alone. Anybody that is responsible for securing a large network is familiar with vulnerability scanning, this chapter helps the reader understand how these tools work, and how to write there own. This type of information is extremely useful to people who find themselves in the position of quickly searching a network for something that other scanners may not detect yet. An example of this would be a new rootkit that listens on port 80. A simple port scan of a network would make finding compromised machines hard because 80 is also a legitimate port for web servers. Applying the information Schiffman gives you, a person could construct a scanner in almost no time. There are a dozen more examples why this book is elite, but rapid development and extensibility of tools that are developed throughout the book makes it a must have for any security professional.

Rating: 5
Summary: Excellent guide for the network administrator
Comment: This book was the perfect reference manual for the busy network administrator that needs to quickly create powerful tools to enforce and monitor network security. From concept to implementation Schiffman will give you a thorough understanding of why and how to create open-sourced security tools that you can start using immediately. Using this book as a reference I was able to create a customized network sniffer and a few vulnerability analysis tools. Another great addition to my library that I highly recommend.

Similar Books:

Title: The Shellcoder's Handbook : Discovering and Exploiting Security Holes
by Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell
ISBN: 0764544683
Publisher: John Wiley & Sons
Pub. Date: 22 March, 2004
List Price(USD): $50.00
Title: Hacking: The Art of Exploitation
by Jon Erickson
ISBN: 1593270070
Publisher: No Starch Press
Pub. Date: October, 2003
List Price(USD): $39.95
Title: Exploiting Software: How to Break Code
by Greg Hoglund, Gary McGraw
ISBN: 0201786958
Publisher: Addison-Wesley Professional
Pub. Date: 01 February, 2004
List Price(USD): $49.99
Title: Security Warrior
by Cyrus Peikari, Anton Chuvakin
ISBN: 0596005458
Publisher: O'Reilly & Associates
Pub. Date: 01 February, 2004
List Price(USD): $44.95
Title: Hacker Disassembling Uncovered
by Kris Kaspersky, Natalia Tarkova, Julie Laing
ISBN: 1931769222
Publisher: A-List Publishing
Pub. Date: 01 April, 2003
List Price(USD): $39.95

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache