Description |
1 online resource (xiii, 270 pages) : illustrations |
|
text file rda |
Note |
"Solutions and examples for Snort administrators"--Cover. |
Bibliography |
Includes bibliographical references and index. |
Contents |
1. Installation and optimization -- 2. Logging, alerts, and output plug-ins -- 3. Rules and signatures -- 4. Preprocessing : an introduction -- 5. Administrative tools -- 6. Log analysis -- 7. Miscellaneous other uses. |
Access |
Use copy Restrictions unspecified star MiAaHDL |
Reproduction |
Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010. MiAaHDL |
System Details |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
Processing Action |
digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Summary |
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT. Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysisBut the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life. |
Subject |
Computer networks -- Security measures.
|
|
Computer security.
|
|
Computers -- Access control.
|
|
Computer Security |
|
Sécurité informatique. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Ordinateurs -- Accès -- Contrôle. |
|
Computer networks -- Security measures |
|
Computer security |
|
Computers -- Access control |
Indexed Term |
Networking |
Added Author |
Babbin, Jacob.
|
|
Biles, Simon.
|
Other Form: |
Print version: Orebaugh, Angela. Snort cookbook. 1st ed. Sebastopol, CA : O'Reilly Media, 2005 |
ISBN |
9780596523411 (electronic bk.) |
|
0596523416 (electronic bk.) |
|
9780596552701 (electronic bk.) |
|
059655270X (electronic bk.) |
Standard No. |
0596007914 (pbk.) |
|
0596007914 |
|