Host Integrity Monitoring Using Osiris and Samhain by Brian WotringHost Integrity Monitoring Using Osiris and Samhain by Brian Wotring

Host Integrity Monitoring Using Osiris and Samhain

byBrian WotringEditorBrian Wotring

Paperback | July 3, 2005

Pricing and Purchase Info

$65.87 online 
$68.95 list price
Earn 329 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments.

Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy.

* Brian Wotring is the creator of Osiris. He speaks and writes frequently on Osiris for major magazines, Web sites, and trade shows. And, the book can be prominently marketed from the Osiris Web site

* This is the first book published on host integrity monitoring, despite the widespread deployment of
Osiris and Samhain

* Host Integrity Monitoring is the only way to accurately determine if a malicious attacker has successfully compromised the security measures of your network
Title:Host Integrity Monitoring Using Osiris and SamhainFormat:PaperbackDimensions:450 pages, 9 × 7 × 0.68 inPublished:July 3, 2005Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1597490180

ISBN - 13:9781597490184

Look for similar items by category:


Table of Contents

Chapter 1: Fundamentals; Chapter 2: Understanding The Terrain In order to be effective at understanding what to monitor; Chapter 3: Threats; Chapter 4: Planning The key to obtaining the most out of the adoption of host integrity tools; Chapter 5: Osiris; Chapter 6: Samhain; Chapter 7: Analysis and Response; Appendix A: Monitoring Linksys Devices Appendix B: Advanced Strategies