Snort 2.0: intrusion detection

The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Beale, James, Foster, James C, Posluns, Jeffrey
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Beale, James
Foster, James C
Posluns, Jeffrey
description The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.
format Book
fullrecord <record><control><sourceid>skillsoft_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9780080481005</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>bks00002836</sourcerecordid><originalsourceid>FETCH-LOGICAL-a66963-e26f4bde24cb396eac3bc247fa93647732a2d12e73b0ad9d0b1c5464664097333</originalsourceid><addsrcrecordid>eNo9j01LxDAQhiMiqGv_gvQkeKhMMtlJ400Wv2DBg8teS5KmWFsa2IkfP9-uK87lncPDy_sciXOAGnQtAeBYFNbU0qKskYymU1Ewv8P-TA2KzsTl65R2uVQ3cFv2U959cJ-mso05hjx_F-KkcyPH4i8XYvtwv1k9VeuXx-fV3bpyRJawioo67duodPBoKbqAPihtOmeRtDGonGqligY9uNa24GVYatJEGqxBxIW4OhTz0I8jpy43PqWBlf42jR94P1nNEjN4fQAdD_GL39KYufkc4y_dzLb_9kv8AdqtSLw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype></control><display><type>book</type><title>Snort 2.0: intrusion detection</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Beale, James ; Foster, James C ; Posluns, Jeffrey</creator><creatorcontrib>Beale, James ; Foster, James C ; Posluns, Jeffrey</creatorcontrib><description>The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.</description><identifier>ISBN: 9781931836746</identifier><identifier>ISBN: 1931836744</identifier><identifier>EISBN: 0080481000</identifier><identifier>EISBN: 9780080481005</identifier><identifier>LCCallNum: TK5105.59 .B43 2003b</identifier><language>eng</language><publisher>Rockland, Mass: Syngress</publisher><subject>Computer networks ; Computer security ; Internet ; Security measures</subject><creationdate>2003</creationdate><tpages>530</tpages><format>530</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,780,784,786</link.rule.ids></links><search><creatorcontrib>Beale, James</creatorcontrib><creatorcontrib>Foster, James C</creatorcontrib><creatorcontrib>Posluns, Jeffrey</creatorcontrib><title>Snort 2.0: intrusion detection</title><description>The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.</description><subject>Computer networks</subject><subject>Computer security</subject><subject>Internet</subject><subject>Security measures</subject><isbn>9781931836746</isbn><isbn>1931836744</isbn><isbn>0080481000</isbn><isbn>9780080481005</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2003</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNo9j01LxDAQhiMiqGv_gvQkeKhMMtlJ400Wv2DBg8teS5KmWFsa2IkfP9-uK87lncPDy_sciXOAGnQtAeBYFNbU0qKskYymU1Ewv8P-TA2KzsTl65R2uVQ3cFv2U959cJ-mso05hjx_F-KkcyPH4i8XYvtwv1k9VeuXx-fV3bpyRJawioo67duodPBoKbqAPihtOmeRtDGonGqligY9uNa24GVYatJEGqxBxIW4OhTz0I8jpy43PqWBlf42jR94P1nNEjN4fQAdD_GL39KYufkc4y_dzLb_9kv8AdqtSLw</recordid><startdate>20030511</startdate><enddate>20030511</enddate><creator>Beale, James</creator><creator>Foster, James C</creator><creator>Posluns, Jeffrey</creator><general>Syngress</general><general>Syngress Publishing, Inc</general><scope/></search><sort><creationdate>20030511</creationdate><title>Snort 2.0: intrusion detection</title><author>Beale, James ; Foster, James C ; Posluns, Jeffrey</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a66963-e26f4bde24cb396eac3bc247fa93647732a2d12e73b0ad9d0b1c5464664097333</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Computer networks</topic><topic>Computer security</topic><topic>Internet</topic><topic>Security measures</topic><toplevel>online_resources</toplevel><creatorcontrib>Beale, James</creatorcontrib><creatorcontrib>Foster, James C</creatorcontrib><creatorcontrib>Posluns, Jeffrey</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Beale, James</au><au>Foster, James C</au><au>Posluns, Jeffrey</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Snort 2.0: intrusion detection</btitle><date>2003-05-11</date><risdate>2003</risdate><isbn>9781931836746</isbn><isbn>1931836744</isbn><eisbn>0080481000</eisbn><eisbn>9780080481005</eisbn><abstract>The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.</abstract><cop>Rockland, Mass</cop><pub>Syngress</pub><tpages>530</tpages></addata></record>
fulltext fulltext
identifier ISBN: 9781931836746
ispartof
issn
language eng
recordid cdi_askewsholts_vlebooks_9780080481005
source O'Reilly Online Learning: Academic/Public Library Edition
subjects Computer networks
Computer security
Internet
Security measures
title Snort 2.0: intrusion detection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T10%3A49%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-skillsoft_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Snort%202.0:%20intrusion%20detection&rft.au=Beale,%20James&rft.date=2003-05-11&rft.isbn=9781931836746&rft.isbn_list=1931836744&rft_id=info:doi/&rft_dat=%3Cskillsoft_askew%3Ebks00002836%3C/skillsoft_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=0080481000&rft.eisbn_list=9780080481005&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true