Cargando…

Snort 2.1 intrusion detection /

Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Beale, Jay
Otros Autores: Alder, Raven
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2004.
Edición:[2nd ed.].
Colección:Jay Beale's open source security series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn162598576
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 070806s2004 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d NTG  |d WPG  |d WAU  |d N15  |d B24X7  |d EBLCP  |d UMI  |d CEF  |d NHM  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d CSL  |d DKDLA  |d OCLCQ  |d OCLCA  |d D6H  |d LEAUB  |d OL$  |d OCLCQ  |d S2H  |d OCLCO  |d OCLCQ  |d KSU  |d OCLCQ  |d OCLCO 
019 |a 60365453  |a 61071674  |a 61326201  |a 62786674  |a 85844893  |a 319430083  |a 475715929  |a 479552021  |a 559415372 
020 |a 9781931836043 
020 |a 1931836043 
020 |a 1932266844  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 9781932266849  |q (electronic bk. ;  |q Adobe Reader) 
029 1 |a CHNEW  |b 001007014 
029 1 |a DEBBG  |b BV042307697 
029 1 |a DEBSZ  |b 355451085 
029 1 |a DEBSZ  |b 405313950 
029 1 |a DEBSZ  |b 449062430 
029 1 |a HEBIS  |b 291520960 
029 1 |a NZ1  |b 12435678 
035 |a (OCoLC)162598576  |z (OCoLC)60365453  |z (OCoLC)61071674  |z (OCoLC)61326201  |z (OCoLC)62786674  |z (OCoLC)85844893  |z (OCoLC)319430083  |z (OCoLC)475715929  |z (OCoLC)479552021  |z (OCoLC)559415372 
037 |a 105406:105434  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5105.59  |b .B43 2004eb 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Beale, Jay. 
245 1 0 |a Snort 2.1 intrusion detection /  |c [Jay Beale] and the Snort development team ; with Raven Alder [and others] ; foreword by Stephen Northcutt. 
250 |a [2nd ed.]. 
260 |a Rockland, MA :  |b Syngress,  |c ©2004. 
300 |a 1 online resource (xxx, 716 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Jay Beale's open source security series 
520 |a Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of Snort, and in depth tutorials of complex installation, configuration, and troubleshooting scenarios. Snort has three primary uses: as a straight packet sniffer, a packet logger, or as a full-blown network intrusion detection system. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes. Snort uses a flexible rules language to describe traffic that it should collect or pass, a detection engine that utilizes a modular plug-in architecture, and a real-time alerting capability. A CD containing the latest version of Snort as well as other up-to-date Open Source security utilities will accompany the book. Snort is a powerful Network Intrusion Detection System that can provide enterprise wide sensors to protect your computer assets from both internal and external attack. * Completly updated and comprehensive coverage of snort 2.1 * Includes free CD with all the latest popular plug-ins * Provides step-by-step instruction for installing, configuring and troubleshooting 
588 0 |a Print version record. 
505 0 |a Ch. 1. Intrusion detection systems -- Ch. 2. Introducing Snort 2.1 -- Ch. 3. Installing Snort -- Ch. 4. Inner workings -- Ch. 5. Playing by the rules -- Ch. 6. Preprocessors -- Ch. 7. Implementing Snort output plug-ins -- Ch. 8. Dealing with the data -- Ch. 9. Keeping everything up to date -- Ch. 10. Optimizing Snort -- Ch. 11. Mucking around with barnyard -- Ch. 12. Active response -- Ch. 13. Advanced Snort. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
653 |a Andre fag (naturvidenskab og teknik)  |a Andre fag 
700 1 |a Alder, Raven. 
776 0 8 |i Print version:  |a Beale, Jay.  |t Snort 2.1 intrusion detection.  |b [2nd ed.].  |d Rockland, MA : Syngress, ©2004  |z 1931836043  |z 9781931836043  |w (OCoLC)55698990 
830 0 |a Jay Beale's open source security series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781931836043/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00004268 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL183952 
994 |a 92  |b IZTAP