Nessus, Snort, & Ethereal power tools : customizing open source security applications /
Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scri...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA : [Sebastopol, Calif.] :
Syngress ; Distributed by O'Reilly Media,
©2005.
|
Colección: | Jay Beale's open source security series.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBSCO_ocm64185769 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 060221s2005 maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d OCLCG |d OCLCQ |d TUU |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d NLGGC |d OCLCQ |d N15 |d E7B |d YDXCP |d IDEBK |d NTG |d WPG |d UMI |d CEF |d DKDLA |d NHM |d B24X7 |d DEBSZ |d MERUC |d OPELS |d FVL |d OCLCQ |d COO |d OCLCQ |d AZK |d CNNLC |d LOA |d AGLDB |d COCUF |d CNNOR |d CCO |d MOR |d PIFBR |d LIV |d OCLCQ |d WY@ |d U3W |d LUE |d STF |d WRM |d D6H |d VTS |d NRAMU |d EZ9 |d MOQ |d INT |d VT2 |d OCLCQ |d G3B |d TKN |d OCLCQ |d UAB |d LEAUB |d M8D |d OCLCO |d INARC |d OCLCQ |d OCLCO | ||
019 | |a 62411699 |a 84146079 |a 162597293 |a 181421113 |a 319430068 |a 473076534 |a 475321955 |a 593862197 |a 606029663 |a 647464635 |a 722429393 |a 728037585 |a 856957571 |a 888433318 |a 961507724 |a 962707029 |a 991918849 |a 1044291885 | ||
020 | |a 1423754220 |q (electronic bk.) | ||
020 | |a 9781423754220 |q (electronic bk.) | ||
020 | |a 0080489427 | ||
020 | |a 9780080489421 | ||
020 | |a 9781597490207 | ||
020 | |a 1597490202 | ||
029 | 1 | |a AU@ |b 000051859983 | |
029 | 1 | |a AU@ |b 000053224752 | |
029 | 1 | |a AU@ |b 000054160021 | |
029 | 1 | |a AU@ |b 000066232174 | |
029 | 1 | |a AU@ |b 000066757020 | |
029 | 1 | |a CHNEW |b 001004854 | |
029 | 1 | |a DEBBG |b BV042307659 | |
029 | 1 | |a DEBBG |b BV043162645 | |
029 | 1 | |a DEBSZ |b 355443341 | |
029 | 1 | |a DEBSZ |b 405313136 | |
029 | 1 | |a DEBSZ |b 422285366 | |
029 | 1 | |a DEBSZ |b 430324146 | |
029 | 1 | |a GBVCP |b 801398576 | |
029 | 1 | |a HEBIS |b 291513654 | |
029 | 1 | |a NZ1 |b 12033479 | |
035 | |a (OCoLC)64185769 |z (OCoLC)62411699 |z (OCoLC)84146079 |z (OCoLC)162597293 |z (OCoLC)181421113 |z (OCoLC)319430068 |z (OCoLC)473076534 |z (OCoLC)475321955 |z (OCoLC)593862197 |z (OCoLC)606029663 |z (OCoLC)647464635 |z (OCoLC)722429393 |z (OCoLC)728037585 |z (OCoLC)856957571 |z (OCoLC)888433318 |z (OCoLC)961507724 |z (OCoLC)962707029 |z (OCoLC)991918849 |z (OCoLC)1044291885 | ||
037 | |a CL0500000038 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 |b .A734 2005eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Archibald, Neil. | |
245 | 1 | 0 | |a Nessus, Snort, & Ethereal power tools : |b customizing open source security applications / |c Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. |
246 | 3 | |a Nessus, Snort, and Ethereal power tools | |
246 | 3 | 0 | |a Customizing open source security applications |
260 | |a Rockland, MA : |b Syngress ; |a [Sebastopol, Calif.] : |b Distributed by O'Reilly Media, |c ©2005. | ||
300 | |a 1 online resource (xxvi, 445 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Jay Beale's open source security series | |
588 | 0 | |a Print version record. | |
505 | 0 | |a pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain. | |
520 | |a Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts. | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Open source software. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels libres. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Open source software. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Open source software |2 fast | |
700 | 1 | |a Ramirez, Gilbert, |d 1972- | |
700 | 1 | |a Rathaus, Noam. | |
710 | 2 | |a Syngress Media, Inc. | |
776 | 0 | 8 | |i Print version: |a Archibald, Neil. |t Nessus, Snort, & Ethereal power tools. |d Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, ©2005 |z 1597490202 |w (OCoLC)62293608 |
830 | 0 | |a Jay Beale's open source security series. | |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149577 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781597490207/?ar |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00004926 | ||
938 | |a ebrary |b EBRY |n ebr10110275 | ||
938 | |a EBSCOhost |b EBSC |n 149577 | ||
938 | |a Internet Archive |b INAR |n nessussnortether0000arch | ||
938 | |a YBP Library Services |b YANK |n 2730624 | ||
938 | |a YBP Library Services |b YANK |n 2395146 | ||
994 | |a 92 |b IZTAP |