Snort 2.0: intrusion detection
The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Beale, James Foster, James C Posluns, Jeffrey |
description | The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds.
The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System. |
format | Book |
fullrecord | <record><control><sourceid>skillsoft_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9780080481005</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>bks00002836</sourcerecordid><originalsourceid>FETCH-LOGICAL-a66963-e26f4bde24cb396eac3bc247fa93647732a2d12e73b0ad9d0b1c5464664097333</originalsourceid><addsrcrecordid>eNo9j01LxDAQhiMiqGv_gvQkeKhMMtlJ400Wv2DBg8teS5KmWFsa2IkfP9-uK87lncPDy_sciXOAGnQtAeBYFNbU0qKskYymU1Ewv8P-TA2KzsTl65R2uVQ3cFv2U959cJ-mso05hjx_F-KkcyPH4i8XYvtwv1k9VeuXx-fV3bpyRJawioo67duodPBoKbqAPihtOmeRtDGonGqligY9uNa24GVYatJEGqxBxIW4OhTz0I8jpy43PqWBlf42jR94P1nNEjN4fQAdD_GL39KYufkc4y_dzLb_9kv8AdqtSLw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype></control><display><type>book</type><title>Snort 2.0: intrusion detection</title><source>O'Reilly Online Learning: Academic/Public Library Edition</source><creator>Beale, James ; Foster, James C ; Posluns, Jeffrey</creator><creatorcontrib>Beale, James ; Foster, James C ; Posluns, Jeffrey</creatorcontrib><description>The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds.
The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.</description><identifier>ISBN: 9781931836746</identifier><identifier>ISBN: 1931836744</identifier><identifier>EISBN: 0080481000</identifier><identifier>EISBN: 9780080481005</identifier><identifier>LCCallNum: TK5105.59 .B43 2003b</identifier><language>eng</language><publisher>Rockland, Mass: Syngress</publisher><subject>Computer networks ; Computer security ; Internet ; Security measures</subject><creationdate>2003</creationdate><tpages>530</tpages><format>530</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,780,784,786</link.rule.ids></links><search><creatorcontrib>Beale, James</creatorcontrib><creatorcontrib>Foster, James C</creatorcontrib><creatorcontrib>Posluns, Jeffrey</creatorcontrib><title>Snort 2.0: intrusion detection</title><description>The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds.
The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.</description><subject>Computer networks</subject><subject>Computer security</subject><subject>Internet</subject><subject>Security measures</subject><isbn>9781931836746</isbn><isbn>1931836744</isbn><isbn>0080481000</isbn><isbn>9780080481005</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2003</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNo9j01LxDAQhiMiqGv_gvQkeKhMMtlJ400Wv2DBg8teS5KmWFsa2IkfP9-uK87lncPDy_sciXOAGnQtAeBYFNbU0qKskYymU1Ewv8P-TA2KzsTl65R2uVQ3cFv2U959cJ-mso05hjx_F-KkcyPH4i8XYvtwv1k9VeuXx-fV3bpyRJawioo67duodPBoKbqAPihtOmeRtDGonGqligY9uNa24GVYatJEGqxBxIW4OhTz0I8jpy43PqWBlf42jR94P1nNEjN4fQAdD_GL39KYufkc4y_dzLb_9kv8AdqtSLw</recordid><startdate>20030511</startdate><enddate>20030511</enddate><creator>Beale, James</creator><creator>Foster, James C</creator><creator>Posluns, Jeffrey</creator><general>Syngress</general><general>Syngress Publishing, Inc</general><scope/></search><sort><creationdate>20030511</creationdate><title>Snort 2.0: intrusion detection</title><author>Beale, James ; Foster, James C ; Posluns, Jeffrey</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a66963-e26f4bde24cb396eac3bc247fa93647732a2d12e73b0ad9d0b1c5464664097333</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Computer networks</topic><topic>Computer security</topic><topic>Internet</topic><topic>Security measures</topic><toplevel>online_resources</toplevel><creatorcontrib>Beale, James</creatorcontrib><creatorcontrib>Foster, James C</creatorcontrib><creatorcontrib>Posluns, Jeffrey</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Beale, James</au><au>Foster, James C</au><au>Posluns, Jeffrey</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Snort 2.0: intrusion detection</btitle><date>2003-05-11</date><risdate>2003</risdate><isbn>9781931836746</isbn><isbn>1931836744</isbn><eisbn>0080481000</eisbn><eisbn>9780080481005</eisbn><abstract>The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds.
The most up-to-date and comprehensive coverage for Snort 2.0!Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.</abstract><cop>Rockland, Mass</cop><pub>Syngress</pub><tpages>530</tpages></addata></record> |
fulltext | fulltext |
identifier | ISBN: 9781931836746 |
ispartof | |
issn | |
language | eng |
recordid | cdi_askewsholts_vlebooks_9780080481005 |
source | O'Reilly Online Learning: Academic/Public Library Edition |
subjects | Computer networks Computer security Internet Security measures |
title | Snort 2.0: intrusion detection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T10%3A49%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-skillsoft_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Snort%202.0:%20intrusion%20detection&rft.au=Beale,%20James&rft.date=2003-05-11&rft.isbn=9781931836746&rft.isbn_list=1931836744&rft_id=info:doi/&rft_dat=%3Cskillsoft_askew%3Ebks00002836%3C/skillsoft_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=0080481000&rft.eisbn_list=9780080481005&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |