رکورد قبلیرکورد بعدی

" Intrusion detection with Snort / "


Document Type : BL
Record Number : 1029769
Doc. No : b784139
Main Entry : Koziol, Jack.
Title & Author : Intrusion detection with Snort /\ Jack Koziol.
Publication Statement : Indianapolis, Ind. :: Sams,, ©2003.
Page. NO : 1 online resource (xx, 340 pages) :: illustrations
ISBN : 0768663997
: : 157870281X
: : 9780768663990
: : 9781578702817
: 157870281X
Notes : Includes index.
Contents : Intrusion detection primer -- Network intrusion detection with Snort -- Dissecting Snort -- Planning for the Snort installation -- The foundation : hardware and operating systems -- Building the server -- Building the sensor -- Building the analyst's console -- Additional installation methods -- Tuning and reducing false positives -- Real-time alerting -- Basic rule writing -- Upgrading and maintaining Snort -- Advanced topics in intrusion prevention.
Abstract : With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
Subject : Computer networks-- Security measures.
Subject : Computer security.
Subject : Computers-- Access control.
Subject : Computer networks-- Security measures.
Subject : Computer security.
Subject : Computers-- Access control.
Subject : COMPUTERS-- Internet-- Security.
Subject : COMPUTERS-- Networking-- Security.
Subject : COMPUTERS-- Security-- General.
Dewey Classification : ‭005.8‬
LC Classification : ‭TK5105.59‬‭.K69 2003eb‬
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟