Managing security with Snort and IDS tools /
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprintin...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Beijing ; Cambridge :
O'Reilly,
©2004.
|
Edición: | 1st ed. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- 1. Introduction
- 2. Network traffic analysis
- 3. Installing Snort
- 4. Know your enemy
- 5. snort.conf file
- 6. Deploying snort
- 7. Creating and managing snort rules
- 8. Intrusion prevention
- 9. Tuning and thresholding
- 10. Using ACID as a snort IDS management console
- 11. Using snort center as a snort IDS management console
- 12. Additional tools for snort IDS management
- 13. Strategies for high-bandwidth implementations of snort
- A. Snort and ACID database schema
- B. default snort.conf file.