Snort is the world's most widely deployed open source intrusion-detection system, with more than 500,000 downloads-a package that can perform protocol analysis, handle content searching and matching, and detect a variety of attacks and probes Drawing on years of security experience and multiple Snort implementations, the authors guide readers through installation, configuration, and management of Snort in a busy operations environment No experience with intrusion detection systems (IDS) required Shows network administrators how to plan an IDS implementation, identify how Snort fits into a security management environment, deploy Snort on Linux and Windows systems, understand and create Snort detection rules, generate reports with ACID and other tools, and discover the nature and source of attacks in real time CD-ROM includes Snort, ACID, and a variety of management tools
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Charlie Scott is an Information Security Analyst for the City of Austin, where he helps maintain the City's network security infrastructure and helps analyze intrusion detection data. He has nearly ten years of experience in the Internet industry and has been an avid user of open source security software that entire time. Charlie is a Certified Information Systems Security Professional (CISSP) and a Cisco Certified Network Professional (CCNP). Bert Hayes is a Security Technical Analyst for the State of Texas, where he maintains network security for a medium sized agency. In Bert's ten years of IT industry experience, he has done everything from managing a corporate IT shop during a successful IPO to performing white hat penetration tests for corporate and government offices. He has long been a proponent of open source solutions, and is a Red Hat Certified Engineer (RHCE). Paul Wolfe is an independent information security consultant and author, specializing in open source security.
Find out how to foil an attack on your network
Choose the right way to deploy and configure Snort no experience required!
Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you train Snort to do your bidding. Discover how intrusion detection systems work, what kind you need, how to install and manage Snort on Linux® or Windows® systems, and more.
All this on the bonus CD-ROM
Discover how to:
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 6,81 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerAnbieter: BooksRun, Philadelphia, PA, USA
Paperback. Zustand: Good. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience. Artikel-Nr. 0764568353-11-1
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.4. Artikel-Nr. G0764568353I3N00
Anzahl: 1 verfügbar
Anbieter: Wonder Book, Frederick, MD, USA
Zustand: Very Good. Very Good condition. A copy that may have a few cosmetic defects. May also contain light spine creasing or a few markings such as an owner's name, short gifter's inscription or light stamp. Bundled media such as CDs, DVDs, floppy disks or access codes may not be included. Artikel-Nr. R11O-00850
Anzahl: 1 verfügbar