Previous Section  < Day Day Up >  Next Section

Chapter 12. More on Open Source Software

You know now how to keep your data safe inside and outside your network and how to detect and investigate attacks on your systems and networks. This book has reviewed dozens of open source security tools covering just about every aspect of information security. However, this just scratches the surface of what is available. For each category, I tried to pick the best tool (in my opinion) to showcase, but there were often scores of others to choose from. In addition, there are open source software alternatives for just about every type of application you can think of, including word processors, network management, multimedia, and more. The list goes on and on.

This final chapter gives you some resources for further investigation of open source security tools and how to get involved in the open source community.

    Previous Section  < Day Day Up >  Next Section