|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
OR_ocn437181532 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mn|---||||| |
008 |
090817s2003 vtu o 000 0 eng d |
040 |
|
|
|a MERUC
|b eng
|e pn
|c MERUC
|d IDEBK
|d OCLCQ
|d NLE
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9780080481005
|q (electronic bk.)
|
020 |
|
|
|a 0080481000
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000071511530
|
035 |
|
|
|a (OCoLC)437181532
|
050 |
|
4 |
|a TK5105.59 .B43 2003b
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Russell, Ryan.
|
245 |
1 |
0 |
|a Snort Intrusion Detection 2.0.
|
260 |
|
|
|a Burlington :
|b Syngress Pub.,
|c 2003.
|
300 |
|
|
|a 1 online resource (559 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover; Contents; Intrusion Detection Systems; Introducing Snort 2.0; Installing Snort; Snort: The Inner Workings; Playing by the Rules; Preprocessors; Implementing Snort Output Plug-Ins; Exploring the Data Analysis Tools; Keeping Everything Up to Date; Optimizing Snort; Mucking Around with Barnyard; Advanced Snort; Index.
|
520 |
|
|
|a The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive abou.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Snort (Software)
|
630 |
0 |
7 |
|a Snort (Software)
|2 fast
|
650 |
|
0 |
|a Intrusion detection systems (Computer security)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Systèmes de détection d'intrusion (Sécurité informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Intrusion detection systems (Computer security)
|2 fast
|
650 |
|
7 |
|a Snort 2.0
|2 gnd
|
776 |
1 |
|
|z 9781931836746
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780080481005/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|