03441nam a2200409Ii 4500991003254959707536m d cr cn|||||||||070806s2004 maua s 001 0 eng d97819318360431931836043b13656193-39ule_inst105406:105434Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSTEFA005.822Beale, Jay.627575Snort 2.1 intrusion detection[electronic resource] /[Jay Beale] and the Snort development team ; with Raven Alder ... [et al.] ; foreword by Stephen Northcutt.[2nd ed.].Rockland, MA :Syngress,c2004.xxx, 716 p. :ill. ;24 cm. +1 CD-ROM (4 3/4 in.)Jay Beale's open source security seriesIncludes index.Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of Snort, and in depth tutorials of complex installation, configuration, and troubleshooting scenarios. Snort has three primary uses: as a straight packet sniffer, a packet logger, or as a full-blown network intrusion detection system. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes. Snort uses a flexible rules language to describe traffic that it should collect or pass, a detection engine that utilizes a modular plug-in architecture, and a real-time alerting capability. A CD containing the latest version of Snort as well as other up-to-date Open Source security utilities will accompany the book. Snort is a powerful Network Intrusion Detection System that can provide enterprise wide sensors to protect your computer assets from both internal and external attack. * Completly updated and comprehensive coverage of snort 2.1 * Includes free CD with all the latest popular plug-ins * Provides step-by-step instruction for installing, configuring and troubleshooting.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Computer networksSecurity measures.Computer security.Electronic books.localAlder, Raven.Original19318360439781931836043(OCoLC)55698990Referexhttp://www.sciencedirect.com/science/book/9781931836043An electronic book accessible through the World Wide Web; click for information.b1365619324-02-2224-01-08991003254959707536C0TEFSnort 2.1 intrusion detection1213149UNISALENTOle02924-01-08mm -engmau00