LEADER 05500nam 2200721Ia 450 001 9910780122103321 005 20230120003840.0 010 $a1-281-05609-X 010 $a9786611056094 010 $a0-08-048100-0 035 $a(CKB)111086906342794 035 $a(EBL)294371 035 $a(OCoLC)174131088 035 $a(SSID)ssj0000763214 035 $a(PQKBManifestationID)11393826 035 $a(PQKBTitleCode)TC0000763214 035 $a(PQKBWorkID)10761930 035 $a(PQKB)11265429 035 $a(SSID)ssj0000078026 035 $a(PQKBManifestationID)11110364 035 $a(PQKBTitleCode)TC0000078026 035 $a(PQKBWorkID)10060837 035 $a(PQKB)11752647 035 $a(Au-PeEL)EBL294371 035 $a(CaPaEBR)ebr10026374 035 $a(CaONFJC)MIL105609 035 $a(OCoLC)935246404 035 $a(CaSebORM)9780080481005 035 $a(MiAaPQ)EBC294371 035 $a(EXLCZ)99111086906342794 100 $a20030519d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSnort 2.0 intrusion detection$b[electronic resource] /$fJay Beale, James C. Foster 205 $a1st edition 210 $aRockland $cSyngress ;$aOxford $cElsevier Science$dc2003 215 $a1 online resource (559 p.) 300 $aIncludes index. 311 $a1-931836-74-4 327 $aFront Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction 327 $aA Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track 327 $aFrequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions 327 $aChapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track 327 $aFrequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS 327 $aSYNGRESS PUBLISHING LICENSE AGREEMENT 330 $aThe incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is 606 $aComputer networks$xSecurity measures 606 $aComputer security 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 676 $a005.8 700 $aBeale$b Jay$0627575 701 $aFoster$b James C$0156401 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910780122103321 996 $aSnort 2.0 intrusion detection$93686361 997 $aUNINA