Search Books
Stealing the Network: How t… How to Cheat at Windows Sys…

Snort Intrusion Detection and Prevention Toolkit

Author Brian Caswell, Jay Beale, Andrew Baker,
Publisher Syngress
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
42.63 USD
🛒 Buy New on Amazon 🇺🇸
Share:
Book Details
PublisherSyngress
ISBN / ASIN1597490997
ISBN-139781597490993
Sales Rank111,239
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

The book will begin with a discussion of packet inspection and the progression from intrusion detection to intrusion prevention. The authors provide examples of packet inspection methods including: protocol standards compliance, protocol anomaly detection, application control, and signature matching. In addition, application-level vulnerabilities including Binary Code in HTTP headers, HTTP/HTTPS Tunneling, URL Directory Traversal, Cross-Site Scripting, and SQL Injection will also be analyzed. Next, a brief chapter on installing and configuring Snort will highlight various methods for fine tuning your installation to optimize Snort performance including hardware/OS selection, finding and eliminating bottlenecks, and benchmarking and testing your deployment. A special chapter also details how to use Barnyard to improve the overall performance of Snort. Next, best practices will be presented allowing readers to enhance the performance of Snort for even the largest and most complex networks. The next chapter reveals the inner workings of Snort by analyzing the source code. The next several chapters will detail how to write, modify, and fine-tune basic to advanced rules and pre-processors.

The last part of the book contains several chapters on active response, intrusion prevention, and using Snort's most advanced capabilities for everything from forensics and incident handling to building and analyzing honey pots.
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View