Cargando…

Snort cookbook

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Orebaugh, Angela
Otros Autores: Babbin, Jacob, Biles, Simon
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2005.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocm79872981
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 041101s2005 caua fob 001 0 eng d
010 |a  2005296361 
040 |a UAB  |b eng  |e pn  |c UAB  |d BAKER  |d CEF  |d OCLCQ  |d CUSER  |d OCLCE  |d VLB  |d AZU  |d NHM  |d MBB  |d N$T  |d EBLCP  |d VMI  |d OCLCQ  |d TEFOD  |d OCLCF  |d DEBSZ  |d OCLCQ  |d GO9  |d YDXCP  |d TEFOD  |d FEM  |d OCLCA  |d OCLCQ  |d WYU  |d AU@  |d VT2  |d CNCEN  |d OTZ  |d ERF  |d UKBTH  |d UHL  |d OCLCQ  |d UKAHL  |d TOH  |d INARC  |d OCLCO  |d LVT  |d TAC  |d OCLCQ  |d FZL  |d OCLCQ  |d OCLCO 
015 |a GBA504246  |2 bnb 
016 7 |a 013085440  |2 Uk 
019 |a 74459587  |a 326649349  |a 607201241  |a 632184926  |a 729550130  |a 748094613  |a 759518360  |a 772458277  |a 809689867  |a 968039158  |a 969073336  |a 1044280916  |a 1056351849  |a 1060873321  |a 1062894943  |a 1074305213  |a 1083198977  |a 1103252672  |a 1104445352  |a 1105765674  |a 1107410077  |a 1112534016  |a 1113148407  |a 1113489761  |a 1124385239  |a 1129358539  |a 1159617507  |a 1202544337  |a 1224586403  |a 1240511698  |a 1259666402  |a 1302277142  |a 1302700932  |a 1351599969  |a 1355686293  |a 1380767470 
020 |a 9780596523411  |q (electronic bk.) 
020 |a 0596523416  |q (electronic bk.) 
020 |a 9780596552701  |q (electronic bk.) 
020 |a 059655270X  |q (electronic bk.) 
020 |z 0596007914 
020 |z 9780596007911 
024 3 |a 0596007914 (pbk.) 
024 8 |a 0596007914 
029 1 |a DEBSZ  |b 396388027 
029 1 |a AU@  |b 000066233149 
029 1 |a AU@  |b 000066532187 
029 1 |a AU@  |b 000067107557 
035 |a (OCoLC)79872981  |z (OCoLC)74459587  |z (OCoLC)326649349  |z (OCoLC)607201241  |z (OCoLC)632184926  |z (OCoLC)729550130  |z (OCoLC)748094613  |z (OCoLC)759518360  |z (OCoLC)772458277  |z (OCoLC)809689867  |z (OCoLC)968039158  |z (OCoLC)969073336  |z (OCoLC)1044280916  |z (OCoLC)1056351849  |z (OCoLC)1060873321  |z (OCoLC)1062894943  |z (OCoLC)1074305213  |z (OCoLC)1083198977  |z (OCoLC)1103252672  |z (OCoLC)1104445352  |z (OCoLC)1105765674  |z (OCoLC)1107410077  |z (OCoLC)1112534016  |z (OCoLC)1113148407  |z (OCoLC)1113489761  |z (OCoLC)1124385239  |z (OCoLC)1129358539  |z (OCoLC)1159617507  |z (OCoLC)1202544337  |z (OCoLC)1224586403  |z (OCoLC)1240511698  |z (OCoLC)1259666402  |z (OCoLC)1302277142  |z (OCoLC)1302700932  |z (OCoLC)1351599969  |z (OCoLC)1355686293  |z (OCoLC)1380767470 
037 |a 2C25619C-096F-4807-A229-9534F35B0BA7  |b OverDrive, Inc.  |n http://www.overdrive.com 
042 |a dlr 
050 4 |a TK5105.59  |b .O74 2005 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Orebaugh, Angela. 
245 1 0 |a Snort cookbook  |h [electronic resource] /  |c Angela Orebaugh, Simon Biles and Jacob Babbin. 
250 |a 1st ed. 
260 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2005. 
300 |a 1 online resource (xiii, 270 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
500 |a "Solutions and examples for Snort administrators"--Cover. 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 0 |g 1.  |t Installation and optimization --  |g 2.  |t Logging, alerts, and output plug-ins --  |g 3.  |t Rules and signatures --  |g 4.  |t Preprocessing : an introduction --  |g 5.  |t Administrative tools --  |g 6.  |t Log analysis --  |g 7.  |t Miscellaneous other uses. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [S.l.] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
520 |a If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT. Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysisBut the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life. 
542 |f Copyright © O'Reilly Media, Inc.  |g 2005 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computers  |x Access control  |2 fast 
653 |a Networking 
700 1 |a Babbin, Jacob. 
700 1 |a Biles, Simon. 
776 0 8 |i Print version:  |a Orebaugh, Angela.  |t Snort cookbook.  |b 1st ed.  |d Sebastopol, CA : O'Reilly Media, 2005 
856 4 0 |u https://learning.oreilly.com/library/view/~/0596007914/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Baker & Taylor  |b BKTY  |c 39.95  |d 29.96  |i 0596007914  |n 0006108685  |s active 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL540775 
938 |a EBSCOhost  |b EBSC  |n 415130 
938 |a YBP Library Services  |b YANK  |n 7365584 
938 |a YBP Library Services  |b YANK  |n 3179842 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26837778 
938 |a Internet Archive  |b INAR  |n snortcookbook0000oreb 
994 |a 92  |b IZTAP