Cargando…

Intrusion detection with Snort /

With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Koziol, Jack
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Sams, ©2003.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocm59788132
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 050428s2003 inua o 001 0 eng d
010 |z  2002110728 
040 |a N$T  |b eng  |e pn  |c N$T  |d OCL  |d OCLCQ  |d YDXCP  |d OCLCQ  |d VLB  |d OCLCQ  |d TEFOD  |d IDEBK  |d AZU  |d NHM  |d OCLCQ  |d OCLCF  |d OCLCQ  |d COO  |d OCLCA  |d UIU  |d CEF  |d WYU  |d VT2  |d OCLCO  |d UKAHL  |d OCLCQ 
019 |a 53839173  |a 63161613  |a 729550753  |a 748093876  |a 1019732324  |a 1044256291  |a 1056351251  |a 1058039694  |a 1060791930  |a 1065069659  |a 1073062879  |a 1103271541  |a 1129362504 
020 |a 0768663997  |q (electronic bk.) 
020 |a 9780768663990  |q (electronic bk.) 
020 |z 157870281X 
020 |a 9781578702817 
020 |a 157870281X 
029 1 |a AU@  |b 000067113987 
029 1 |a AU@  |b 000055278652 
035 |a (OCoLC)59788132  |z (OCoLC)53839173  |z (OCoLC)63161613  |z (OCoLC)729550753  |z (OCoLC)748093876  |z (OCoLC)1019732324  |z (OCoLC)1044256291  |z (OCoLC)1056351251  |z (OCoLC)1058039694  |z (OCoLC)1060791930  |z (OCoLC)1065069659  |z (OCoLC)1073062879  |z (OCoLC)1103271541  |z (OCoLC)1129362504 
037 |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59  |b .K69 2003eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Koziol, Jack. 
245 1 0 |a Intrusion detection with Snort /  |c Jack Koziol. 
260 |a Indianapolis, Ind. :  |b Sams,  |c ©2003. 
300 |a 1 online resource (xx, 340 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
505 0 |a Intrusion detection primer -- Network intrusion detection with Snort -- Dissecting Snort -- Planning for the Snort installation -- The foundation : hardware and operating systems -- Building the server -- Building the sensor -- Building the analyst's console -- Additional installation methods -- Tuning and reducing false positives -- Real-time alerting -- Basic rule writing -- Upgrading and maintaining Snort -- Advanced topics in intrusion prevention. 
588 0 |a Print version record. 
520 |a With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779 
776 0 8 |i Print version:  |a Koziol, Jack.  |t Intrusion detection with Snort.  |d Indianapolis, Ind. : Sams, ©2003  |z 157870281X  |w (DLC) 2002110728  |w (OCoLC)52513072 
856 4 0 |u https://learning.oreilly.com/library/view/~/157870281X/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH14556295 
938 |a EBSCOhost  |b EBSC  |n 128860 
938 |a YBP Library Services  |b YANK  |n 2339905 
994 |a 92  |b IZTAP