Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Snort for Dummies

Buy
Snort for Dummies, 9780764568350 (0764568353), For Dummies, 2004
Find out how to foil an attack on your network

Choose the right way to deploy and configure Snort — no experience required!

Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you train Snort to do your bidding. Discover how intrusion detection systems work, what kind you need, how to install and manage Snort on Linux® or Windows® systems, and more.

All this on the bonus CD-ROM

  • Snort Intrusion Detection System for Linux and Windows
  • ACID Snort Visualization Console
  • Barnyard unified logging tool and Oinkmaster rule manager
  • Assorted other Snort management tools

Discover how to:

  • Integrate Snort into your security plan
  • Decide on the best deployment
  • Create and update detection rules
  • Generate reports with ACID
  • Get real-time alerts in case of attack
About the Author

Charlie Scott
is an Information Security Analyst for the City of Austin, where he helps maintain the City’s network security infrastructure and helps analyze intrusion detection data. He has nearly ten years of experience in the Internet industry and has been an avid user of open source security software that entire time. Charlie is a Certified Information Systems Security Professional (CISSP) and a Cisco Certified Network Professional (CCNP).

Bert Hayes is a Security Technical Analyst for the State of Texas, where he maintains network security for a medium sized agency. In Bert’s ten years of IT industry experience, he has done everything from managing a corporate IT shop during a successful IPO to performing white hat penetration tests for corporate and government offices. He has long been a proponent of open source solutions, and is a Red Hat Certified Engineer (RHCE).

Paul Wolfe is an independent information security consultant and author, specializing in open source security.

(HTML tags aren't allowed.)

Configuring SAP R/3 FI/CO: The Essential Resource for Configuring the Financial and Controlling Modules
Configuring SAP R/3 FI/CO: The Essential Resource for Configuring the Financial and Controlling Modules
SAP's FI/CO (Financial and Controlling) is the company's most popular package. This in-depth guide for implementers, consultants, and IS managers covers how to identify the business needs of the planned installation and then how to go about customizing the system accordingly. The book covers many topics not addressed in other books, including...
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Network Protocol Handbook (4th Edition)
Network Protocol Handbook (4th Edition)
All active network protocols, including the most popular TCP/IP, WAN, LAN technologies are fully explained and well illustrated; Covers the latest and emerging technologies such as VOIP, SAN, MAN, VPN/Security, WLAN, VLAN and more.

About the Author

Javvin Technologies Inc., based at the Silicon
...

Stem Cell Transplantation for Hemotologic Malignancies (Contemporary Hematology)
Stem Cell Transplantation for Hemotologic Malignancies (Contemporary Hematology)

A comprehensive survey of the current state-of-the-art in hematopoietic stem cell transplantation for malignant disease. The authors focus on the indications and results of transplantation for acute leukemia, chronic myelogenous leukemia, lymphoma, multiple myeloma, and breast cancer. Special attention is given to transplant-related...

Compiling Techniques
Compiling Techniques
The name compiler has been given to a computer program which will accept as data a program in a problem-oriented language, such as Algol or Fortran, and produce as output a computer-oriented code which, after possibly some further processing by an assembler or loader, will be capable of being obeyed by a computer and produce results equivalent to...
Identity Theft: A Reference Handbook (Contemporary World Issues)
Identity Theft: A Reference Handbook (Contemporary World Issues)

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

• Includes a chronology of key decisions, cases, and government action in the development...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy