Cargando…

Managing security with Snort and IDS tools /

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprintin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cox, Kerry
Otros Autores: Gerg, Christopher
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Beijing ; Cambridge : O'Reilly, ©2004.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Introduction
  • 2. Network traffic analysis
  • 3. Installing Snort
  • 4. Know your enemy
  • 5. snort.conf file
  • 6. Deploying snort
  • 7. Creating and managing snort rules
  • 8. Intrusion prevention
  • 9. Tuning and thresholding
  • 10. Using ACID as a snort IDS management console
  • 11. Using snort center as a snort IDS management console
  • 12. Additional tools for snort IDS management
  • 13. Strategies for high-bandwidth implementations of snort
  • A. Snort and ACID database schema
  • B. default snort.conf file.