Logo

Intrusion Detection with SNORT

Large book cover: Intrusion Detection with SNORT

Intrusion Detection with SNORT
by

Publisher: Prentice Hall PTR
ISBN/ASIN: 0131407333
ISBN-13: 9780131407336
Number of pages: 275

Description:
Network security has become an important part of corporate IT strategy and safeguarding all the nooks and crannies of your network can be timely and expensive. This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Rehman provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data. The book contains custom scripts, real-life examples for SNORT, and to-the-point information about installing SNORT IDS so readers can build and run their sophisticated intrusion detection systems.

Download or read it online for free here:
Download link
(2.5MB, PDF)

Similar books

Book cover: Snort CookbookSnort Cookbook
by - O'Reilly Media
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
(13197 views)
Book cover: Nmap Network ScanningNmap Network Scanning
by - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(24742 views)
Book cover: Open Source Security Tools: Practical Guide to Security ApplicationsOpen Source Security Tools: Practical Guide to Security Applications
by - Prentice Hall PTR
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(18925 views)
Book cover: Information Security and Privacy in Network EnvironmentsInformation Security and Privacy in Network Environments
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(10694 views)