LEADER 03409cam a2200397Ii 4500 001 991003249879707536 006 m d 007 cr cn||||||||| 008 070806s2005 maua s 001 0 eng d 020 $a9781597490184 020 $a1597490180 035 $ab13655425-39ule_inst 037 $a113428:113518$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS$dOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aWotring, Brian.$0627550 245 10$aHost integrity monitoring$h[electronic resource] :$busing Osiris and Samhain /$cBian Wotring; Bruce Potter, technical editor; foreword by Marcus J. Ranum. 260 $aRockland, MA :$bSyngress,$cc2005. 300 $axxvi, 421 p. :$bill. ;$c23 cm. 500 $aIncludes index. 505 0 $aChapter 1: Fundamentals; Chapter 2: Understanding The Terrain In order to be effective at understanding what to monitor; Chapter 3: Threats; Chapter 4: Planning The key to obtaining the most out of the adoption of host integrity tools; Chapter 5: Osiris; Chapter 6: Samhain; Chapter 7: Analysis and Response; Appendix A: Monitoring Linksys Devices Appendix B: Advanced Strategies. 520 $aThis book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments. Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy. * Brian Wotring is the creator of Osiris. He speaks and writes frequently on Osiris for major magazines, Web sites, and trade shows. And, the book can be prominently marketed from the Osiris Web site * This is the first book published on host integrity monitoring, despite the widespread deployment of Osiris and Samhain * Host Integrity Monitoring is the only way to accurately determine if a malicious attacker has successfully compromised the security measures of your network. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks$xSecurity measures. 655 7$aElectronic books.$2local 700 1 $aPotter, Bruce.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0621288 700 1 $aRanum, Marcus J. 776 1 $cOriginal$z1597490180$z9781597490184$w(OCoLC)61231484 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781597490184$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655425$b24-02-22$c24-01-08 912 $a991003249879707536 994 $aC0$bTEF 996 $aHost integrity monitoring$91463980 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0