• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Intrusion detection with Snort /

پدید آورنده
Jack Koziol.

موضوع
Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

رده
TK5105
.
59
.
K69
2003eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0768663997
(Number (ISBN
157870281X
(Number (ISBN
9780768663990
(Number (ISBN
9781578702817
Erroneous ISBN
157870281X

NATIONAL BIBLIOGRAPHY NUMBER

Number
b784139

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Intrusion detection with Snort /
General Material Designation
[Book]
First Statement of Responsibility
Jack Koziol.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Indianapolis, Ind. :
Name of Publisher, Distributor, etc.
Sams,
Date of Publication, Distribution, etc.
©2003.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xx, 340 pages) :
Other Physical Details
illustrations

GENERAL NOTES

Text of Note
Includes index.

CONTENTS NOTE

Text of Note
Intrusion detection primer -- Network intrusion detection with Snort -- Dissecting Snort -- Planning for the Snort installation -- The foundation : hardware and operating systems -- Building the server -- Building the sensor -- Building the analyst's console -- Additional installation methods -- Tuning and reducing false positives -- Real-time alerting -- Basic rule writing -- Upgrading and maintaining Snort -- Advanced topics in intrusion prevention.
0

SUMMARY OR ABSTRACT

Text of Note
With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
OverDrive, Inc.

OTHER EDITION IN ANOTHER MEDIUM

Title
Intrusion detection with Snort.
International Standard Book Number
157870281X

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer security.
Computers-- Access control.
Computer networks-- Security measures.
Computer security.
Computers-- Access control.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59
Book number
.
K69
2003eb

PERSONAL NAME - PRIMARY RESPONSIBILITY

Koziol, Jack.

ORIGINATING SOURCE

Date of Transaction
20201206222209.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival