Logo

Snort Cookbook by A. Orebaugh, S. Biles, J. Babbin

Large book cover: Snort Cookbook

Snort Cookbook
by

Publisher: O'Reilly Media
ISBN/ASIN: 0596007914
ISBN-13: 9780596007911

Description:
Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by - Puget Sound Software
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
(8817 views)
Book cover: Network Security and ManagementNetwork Security and Management
- Wikipedia
From the table of contents: Introduction (Code, Cipher, Cryptography); Stream Ciphers (Stream cipher, Rotor machine, Stream cipher attack, ...); Public Key Systems; System Identification and Clustering; Security; Telecommunication Networks.
(2156 views)
Book cover: Guide to Securing Intranet and Extranet ServersGuide to Securing Intranet and Extranet Servers
- VeriSign
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(6323 views)
Book cover: Firewalls and Internet Security: Repelling the Wily HackerFirewalls and Internet Security: Repelling the Wily Hacker
by - Addison-Wesley
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
(9515 views)