Snort cookbook solutions and examples for Snort administrators

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way t...

Descripción completa

Detalles Bibliográficos
Autor principal: Orebaugh, Angela (-)
Otros Autores: Biles, Simon, Babbin, Jacob
Formato: Libro electrónico
Idioma:Inglés
Publicado: Sebastopol, California : O'Reilly Media 2005.
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627127706719
Descripción
Sumario:If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching,
Notas:Description based upon print version of record.
Descripción Física:1 online resource (288 p.)
Available also in a print edition
Bibliografía:Includes bibliographical references and index.
ISBN:9780596523411
9780596552701