Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools

Configuration and Evaluation of Some Microsoft and Linux Proxy Servers, Security, Intrusion Detection, AntiVirus and AntiSpam Tools

    • ‏13٫99 US$
    • ‏13٫99 US$

وصف الناشر

The book consists from three parts: Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two MethodsI. Part A: Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server.
Part A concerns about basic Microsoft ISA server and Linux Squid Server configuration  As a lot of  technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts
Microsoft ISA server 2004 Configuration
Linux Squid Server Configuration
II. Part B: Evaluation of Some Windows and Linux Intrusion Detection Tools
Part B evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools: LANguard Nessus Snort BASE ACID Rman SnortCenter. OSSEC SguilIII. Part C: Quick Configuration of Postfix Mail Server to Support Anti Spam and Anti Virus Using Two Methods
In Part C, I configured the Postfix mail server that support the Anti-Spam and Anti-Virus, using two methods, for sake of evaluation and realizing which method can be considered to be the best, Method 1: With Postfix, SpamAssassin, ClamAV and Amavis-new Method 2: With Postfix, SpamAssassin, ClamAV and Procmail 
 

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٢٠
٢٥ ديسمبر
اللغة
EN
الإنجليزية
عدد الصفحات
٧٣
الناشر
Dr. Hidaia Mahmood Alassouli
البائع
StreetLib Srl
الحجم
٤١٩٫٣
ك.ب.
Dr. Tom Shinder's Configuring ISA Server 2004 Dr. Tom Shinder's Configuring ISA Server 2004
٢٠٠٤
Hack Proofing Linux Hack Proofing Linux
٢٠٠١
Configuring ISA Server 2000 Configuring ISA Server 2000
٢٠٠١
Dr. Tom Shinder's ISA Server 2006 Migration Guide (Enhanced Edition) Dr. Tom Shinder's ISA Server 2006 Migration Guide (Enhanced Edition)
٢٠١١
Checkpoint Next Generation Security Administration Checkpoint Next Generation Security Administration
٢٠٠٢
Dr Tom Shinder's ISA Server and Beyond (Enhanced Edition) Dr Tom Shinder's ISA Server and Beyond (Enhanced Edition)
٢٠٠٢
Distribution of Electrical Power Distribution of Electrical Power
٢٠٢٠
Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges
٢٠٢٠
مواضيع متفرقه حول الحسد والمس بالجن والسحر‬ مواضيع متفرقه حول الحسد والمس بالجن والسحر‬
٢٠٢٠
تاريخ الأديان والحضارات تاريخ الأديان والحضارات
٢٠٢١
Hacking of Computer Networks Hacking of Computer Networks
٢٠٢٠
Quick Guide for Creating, Selling and Buying Non-Fungible Tokens (NFTs) Quick Guide for Creating, Selling and Buying Non-Fungible Tokens (NFTs)
٢٠٢٢