Cargando…

Managing security with Snort and IDS tools /

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprintin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cox, Kerry
Otros Autores: Gerg, Christopher
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Beijing ; Cambridge : O'Reilly, ©2004.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn729550077
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 041213s2004 cc a ob 001 0 eng d
010 |z  2004276166 
040 |a AZU  |b eng  |e pn  |c AZU  |d OCLCQ  |d MBB  |d N$T  |d EBLCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d YDXCP  |d E7B  |d OCLCQ  |d COO  |d OCLCQ  |d FEM  |d OCLCA  |d OCLCF  |d CEF  |d WYU  |d AU@  |d VT2  |d UHL  |d UKAHL  |d OCLCQ  |d INARC  |d CZL  |d DST  |d OCLCQ  |d OCLCO  |d OCL  |d OCLCQ 
019 |a 748094045  |a 774400490  |a 861530958  |a 966108901  |a 968045140  |a 969020434  |a 1044226290  |a 1056440019  |a 1060871470  |a 1065107424  |a 1075507544  |a 1103268758  |a 1113658602  |a 1129377689  |a 1202554396  |a 1240523491  |a 1280719042  |a 1295593942  |a 1300507790  |a 1303301816 
020 |a 9780596517847  |q (electronic bk.) 
020 |a 059651784X  |q (electronic bk.) 
020 |z 0596006616  |q (pbk.) 
020 |z 9780596006617 
020 |a 9780596552435 
020 |a 0596552432 
029 1 |a DEBSZ  |b 396386911 
029 1 |a AU@  |b 000066232222 
029 1 |a AU@  |b 000066532923 
029 1 |a AU@  |b 000067108151 
035 |a (OCoLC)729550077  |z (OCoLC)748094045  |z (OCoLC)774400490  |z (OCoLC)861530958  |z (OCoLC)966108901  |z (OCoLC)968045140  |z (OCoLC)969020434  |z (OCoLC)1044226290  |z (OCoLC)1056440019  |z (OCoLC)1060871470  |z (OCoLC)1065107424  |z (OCoLC)1075507544  |z (OCoLC)1103268758  |z (OCoLC)1113658602  |z (OCoLC)1129377689  |z (OCoLC)1202554396  |z (OCoLC)1240523491  |z (OCoLC)1280719042  |z (OCoLC)1295593942  |z (OCoLC)1300507790  |z (OCoLC)1303301816 
037 |a 7021672957631337682  |b TotalBoox  |f Ebook only  |n www.totalboox.com 
050 4 |a TK5105.59  |b .C65 2004eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Cox, Kerry. 
245 1 0 |a Managing security with Snort and IDS tools /  |c Kerry Cox and Christopher Gerg. 
250 |a 1st ed. 
260 |a Beijing ;  |a Cambridge :  |b O'Reilly,  |c ©2004. 
300 |a 1 online resource (xvi, 269 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
588 0 |a Print version record. 
505 0 0 |g 1.  |t Introduction --  |g 2.  |t Network traffic analysis --  |g 3.  |t Installing Snort --  |g 4.  |t Know your enemy --  |g 5.  |t snort.conf file --  |g 6.  |t Deploying snort --  |g 7.  |t Creating and managing snort rules --  |g 8.  |t Intrusion prevention --  |g 9.  |t Tuning and thresholding --  |g 10.  |t Using ACID as a snort IDS management console --  |g 11.  |t Using snort center as a snort IDS management console --  |g 12.  |t Additional tools for snort IDS management --  |g 13.  |t Strategies for high-bandwidth implementations of snort --  |g A.  |t Snort and ACID database schema --  |g B.  |t default snort.conf file. 
504 |a Includes bibliographical references and index. 
520 |a Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices. Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Snort (Computer file) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computers  |x Access control. 
650 0 |a Intrusion detection systems (Computer security) 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Ordinateurs  |x Accès  |x Contrôle. 
650 6 |a Systèmes de détection d'intrusion (Sécurité informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Intrusion detection systems (Computer security)  |2 fast  |0 (OCoLC)fst01762593 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computers  |x Access control.  |2 fast  |0 (OCoLC)fst00872779 
700 1 |a Gerg, Christopher. 
776 0 8 |i Print version:  |a Cox, Kerry.  |t Managing security with Snort and IDS tools.  |b 1st ed.  |d Beijing ; Cambridge : O'Reilly, ©2004  |w (DLC) 2004276166 
856 4 0 |u https://learning.oreilly.com/library/view/~/0596006616/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26837813 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL540585 
938 |a ebrary  |b EBRY  |n ebr10758636 
938 |a EBSCOhost  |b EBSC  |n 415580 
938 |a YBP Library Services  |b YANK  |n 7427885 
938 |a YBP Library Services  |b YANK  |n 3179825 
938 |a Internet Archive  |b INAR  |n managingsecurity0000coxk 
994 |a 92  |b IZTAP