Managing security with Snort and IDS tools /
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprintin...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Other Authors: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Beijing ; Cambridge :
O'Reilly,
©2004.
|
Edition: | 1st ed. |
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- 1. Introduction
- 2. Network traffic analysis
- 3. Installing Snort
- 4. Know your enemy
- 5. snort.conf file
- 6. Deploying snort
- 7. Creating and managing snort rules
- 8. Intrusion prevention
- 9. Tuning and thresholding
- 10. Using ACID as a snort IDS management console
- 11. Using snort center as a snort IDS management console
- 12. Additional tools for snort IDS management
- 13. Strategies for high-bandwidth implementations of snort
- A. Snort and ACID database schema
- B. default snort.conf file.