Snort cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Autres auteurs: | , |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Sebastopol, CA :
O'Reilly Media,
2005.
|
Édition: | 1st ed. |
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Table des matières:
- 1. Installation and optimization
- 2. Logging, alerts, and output plug-ins
- 3. Rules and signatures
- 4. Preprocessing : an introduction
- 5. Administrative tools
- 6. Log analysis
- 7. Miscellaneous other uses.