LEADER 03894cam a2200457Ii 4500 001 991003249979707536 006 m d 007 cr cn||||||||| 008 070806s2005 maua s 001 0 eng d 020 $a9781597490207 020 $a1597490202 035 $ab13655449-39ule_inst 037 $a114099:114192$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS$dOPELS 049 $aTEFA 082 04$a005.8$222 100 1 $aArchibald, Neil.$0627551 245 10$aNessus, Snort, & Ethereal power tools$h[electronic resource] :$bcustomizing open source security applications /$cNeil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. 246 3 $aNessus, Snort, and Ethereal power tools 246 30$aCustomizing open source security applications 260 $aRockland, MA :$bSyngress ;$a[Sebastopol, Calif.] :$bDistributed by O'Reilly Media,$cc2005. 300 $axxvi, 445 p. :$bill. ;$c24 cm. 440 0$aJay Beale's open source security series 500 $aIncludes index. 505 0 $aPart I: Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; Part II: Snort Tools; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Part III: Etherial Tools; Capture file Formats; Protocol Dissectors; Reporting from Etherial; Appendix A Host Integrity Monitoring Using Osiris and Samhain. 520 $aThis book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. * Snort, Nessus, and Ethereal are the three most popular open source security tools in the world * Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters * Companion Web site provides all working code and scripts from the book for download. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer networks$xSecurity measures. 650 0$aOpen source software. 655 7$aElectronic books.$2local 700 1 $aRamirez, Gilbert,$d1972-$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739040 700 1 $aRathaus, Noam.$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739041 710 2 $aSyngress Media, Inc. 776 1 $cOriginal$z1597490202$z9781597490207$w(OCoLC)62293608 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781597490207$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655449$b24-02-22$c24-01-08 912 $a991003249979707536 994 $aC0$bTEF 996 $aNessus, Snort, & Ethereal power tools$91463982 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0