Cargando…

Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications.

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest open...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Caswell, Brian
Otros Autores: Beale, Jay, Ramirez, Gilbert, Rathaus, Noam, Burke, Josh
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Saint Louis : Elsevier Science, 2014.
Colección:Jay Beale's Open Source Security.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn935246511
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 160123s2014 mou o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d MERUC  |d ZCU  |d S8J  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCA  |d ICG  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d HF9 
019 |a 935230463 
020 |a 9780080489421 
020 |a 0080489427 
029 1 |a DEBBG  |b BV044082956 
035 |a (OCoLC)935246511  |z (OCoLC)935230463 
050 4 |a TK5105.59 ǂb A73 2005eb 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Caswell, Brian. 
245 1 0 |a Nessus, Snort, & Ethereal Power Tools :  |b Customizing Open Source Security Applications. 
260 |a Saint Louis :  |b Elsevier Science,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Jay Beale's Open Source Security 
588 0 |a Print version record. 
505 0 |a Cover; Contents; Foreword; Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Capture File Formats; Protocol Dissectors; Reporting from Ethereal; Host Integrity Monitoring Using Osiris and Samhain; Index; Related Titles. 
520 |a This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most com. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Open source software. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels libres. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Open source software  |2 fast 
700 1 |a Beale, Jay. 
700 1 |a Ramirez, Gilbert. 
700 1 |a Rathaus, Noam. 
700 1 |a Burke, Josh. 
776 0 8 |i Print version:  |a Caswell, Brian.  |t Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications.  |d Saint Louis : Elsevier Science, ©2014  |z 9781597490207 
830 0 |a Jay Beale's Open Source Security. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=254839  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4052662 
994 |a 92  |b IZTAP