Sprache: Englisch
Verlag: O'Reilly Media, Incorporated, 2005
ISBN 10: 0596007914 ISBN 13: 9780596007911
Anbieter: Better World Books: West, Reno, NV, USA
Erstausgabe
Zustand: Good. 1st Edition. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Sprache: Englisch
Verlag: O'Reilly Media, Incorporated, 2005
ISBN 10: 0596007914 ISBN 13: 9780596007911
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
Zustand: Good. 1st Edition. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: World of Books (was SecondSale), Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
Sprache: Englisch
Verlag: O'Reilly Media, Incorporated, 2005
ISBN 10: 0596007914 ISBN 13: 9780596007911
Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
Erstausgabe
EUR 9,87
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. 1st Edition. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
EUR 40,34
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. illustrated edition. 400 pages. 9.25x7.00x0.75 inches. In Stock.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 57,28
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 34,21
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. SNORT, the defacto standard of intrusion detection tools, can save countless headaches the new SNORT Cookbook will save countless hours of trial and error. Each recipe offers a clear description of a gnarly problem, a concise but complete solution, and p.
EUR 64,00
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. * Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network* Dozens of working scripts and tools presented throughout the book are available for download.
Zustand: Buone. italiano Condizioni dell'esterno: Buone Condizioni dell'interno: Buone.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the 'Top 10? security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the 'Top 10? list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site.Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of 'log file.? This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.