Nessus network auditing [[electronic resource] /] / Jay Beale |
Autore | Beale Jay |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2004 |
Descrizione fisica | 1 online resource (545 p.) |
Disciplina |
004.6
005.8 |
Soggetto topico |
Computer networks - Auditing
Computer networks - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05587-5
9786611055875 0-08-047962-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; Index |
Record Nr. | UNINA-9910450012403321 |
Beale Jay | ||
Rockland, MA, : Syngress, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Nessus network auditing [[electronic resource] /] / Jay Beale |
Autore | Beale Jay |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2004 |
Descrizione fisica | 1 online resource (545 p.) |
Disciplina |
004.6
005.8 |
Soggetto topico |
Computer networks - Auditing
Computer networks - Security measures |
ISBN |
1-281-05587-5
9786611055875 0-08-047962-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; Index |
Record Nr. | UNINA-9910782958903321 |
Beale Jay | ||
Rockland, MA, : Syngress, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Nessus network auditing / / Jay Beale |
Autore | Beale Jay |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2004 |
Descrizione fisica | 1 online resource (545 p.) |
Disciplina |
004.6
005.8 |
Soggetto topico |
Computer networks - Auditing
Computer networks - Security measures |
ISBN |
1-281-05587-5
9786611055875 0-08-047962-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; Index |
Record Nr. | UNINA-9910816103703321 |
Beale Jay | ||
Rockland, MA, : Syngress, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster |
Autore | Beale Jay |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, : Syngress |
Descrizione fisica | 1 online resource (559 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-05609-X
9786611056094 0-08-048100-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS SYNGRESS PUBLISHING LICENSE AGREEMENT |
Record Nr. | UNINA-9910456347903321 |
Beale Jay | ||
Rockland, : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster |
Autore | Beale Jay |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, : Syngress |
Descrizione fisica | 1 online resource (559 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-281-05609-X
9786611056094 0-08-048100-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS SYNGRESS PUBLISHING LICENSE AGREEMENT |
Record Nr. | UNINA-9910780122103321 |
Beale Jay | ||
Rockland, : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Snort 2.0 intrusion detection / / Jay Beale, James C. Foster |
Autore | Beale Jay |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, : Syngress |
Descrizione fisica | 1 online resource (559 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | FosterJames C |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN |
1-281-05609-X
9786611056094 0-08-048100-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS SYNGRESS PUBLISHING LICENSE AGREEMENT |
Record Nr. | UNINA-9910816736803321 |
Beale Jay | ||
Rockland, : Syngress | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|