top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Nessus network auditing [[electronic resource] /] / Jay Beale
Nessus network auditing [[electronic resource] /] / Jay Beale
Autore Beale Jay
Pubbl/distr/stampa Rockland, MA, : Syngress, c2004
Descrizione fisica 1 online resource (545 p.)
Disciplina 004.6
005.8
Soggetto topico Computer networks - Auditing
Computer networks - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-281-05587-5
9786611055875
0-08-047962-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; Index
Record Nr. UNINA-9910450012403321
Beale Jay  
Rockland, MA, : Syngress, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Nessus network auditing [[electronic resource] /] / Jay Beale
Nessus network auditing [[electronic resource] /] / Jay Beale
Autore Beale Jay
Pubbl/distr/stampa Rockland, MA, : Syngress, c2004
Descrizione fisica 1 online resource (545 p.)
Disciplina 004.6
005.8
Soggetto topico Computer networks - Auditing
Computer networks - Security measures
ISBN 1-281-05587-5
9786611055875
0-08-047962-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; Index
Record Nr. UNINA-9910782958903321
Beale Jay  
Rockland, MA, : Syngress, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Nessus network auditing / / Jay Beale
Nessus network auditing / / Jay Beale
Autore Beale Jay
Edizione [1st ed.]
Pubbl/distr/stampa Rockland, MA, : Syngress, c2004
Descrizione fisica 1 online resource (545 p.)
Disciplina 004.6
005.8
Soggetto topico Computer networks - Auditing
Computer networks - Security measures
ISBN 1-281-05587-5
9786611055875
0-08-047962-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Vulnerability Assessment; Introducing Nessus; Installing Nessus; Running Your First Scan; Interpreting Results; Vulnerability Types; False Positives; Under the Hood; The Nessus Knowledge Base; Enterprise Scanning; NASL; The Nessus User Community; The NASL2 Reference Manual; Utilizing Domain Credentials to Enhance Nessus Scans; Index
Record Nr. UNINA-9910816103703321
Beale Jay  
Rockland, MA, : Syngress, c2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster
Autore Beale Jay
Edizione [1st edition]
Pubbl/distr/stampa Rockland, : Syngress
Descrizione fisica 1 online resource (559 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
Soggetto genere / forma Electronic books.
ISBN 1-281-05609-X
9786611056094
0-08-048100-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS
SYNGRESS PUBLISHING LICENSE AGREEMENT
Record Nr. UNINA-9910456347903321
Beale Jay  
Rockland, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster
Snort 2.0 intrusion detection [[electronic resource] /] / Jay Beale, James C. Foster
Autore Beale Jay
Edizione [1st edition]
Pubbl/distr/stampa Rockland, : Syngress
Descrizione fisica 1 online resource (559 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-281-05609-X
9786611056094
0-08-048100-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS
SYNGRESS PUBLISHING LICENSE AGREEMENT
Record Nr. UNINA-9910780122103321
Beale Jay  
Rockland, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Snort 2.0 intrusion detection / / Jay Beale, James C. Foster
Snort 2.0 intrusion detection / / Jay Beale, James C. Foster
Autore Beale Jay
Edizione [1st edition]
Pubbl/distr/stampa Rockland, : Syngress
Descrizione fisica 1 online resource (559 p.)
Disciplina 005.8
Altri autori (Persone) FosterJames C
Soggetto topico Computer networks - Security measures
Computer security
ISBN 1-281-05609-X
9786611056094
0-08-048100-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Snort 2.0 Intrusion Detection; Copyright Page; Contents; Chapter 1. Intrusion Detection Systems; Introduction; What Is Intrusion Detection?; A Trilogy of Vulnerabilities; Why Are Intrusion Detection Systems Important?; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Introducing Snort 2.0; Introduction; What Is Snort?; Snort System Requirements; Exploring Snort's Features; Using Snort on Your Network; Security Considerations with Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Installing Snort; Introduction
A Brief Word about Linux DistributionsInstalling PCAP; Installing Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Snort: The Inner Workings; Introduction; Snort Components; Decoding Packets; Processing Packets 101; Understanding Rule Parsing and Detection Engines; Output and Logs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Playing by the Rules; Introduction; Understanding Configuration Files; The Rule Header; The Rule Body; Components of a Good Rule; Testing Your Rules; Tuning Your Rules; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 6. Preprocessors; Introduction; What Is a Preprocessor?; Preprocessor Options for Reassembling Packets; Preprocessor Options for Decoding and Normalizing Protocols; Preprocessor Options for Nonrule or Anomaly-Based Detection; Experimental Preprocessors; Writing Your Own Preprocessor; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Implementing Snort Output Plug-Ins; Introduction; What Is an Output Plug-In?; Exploring Output Plug-In Options; Writing Your Own Output Plug-In; Summary; Solutions Fast Track; Frequently Asked Questions
Chapter 8. Exploring the Data Analysis ToolsIntroduction; Using Swatch; Using ACID; Using SnortSnarf; Using IDScenter; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Keeping Everything Up to Date; Introduction; Applying Patches; Updating Rules; Testing Rule Updates; Watching for Updates; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Optimizing Snort; Introduction; How Do I Choose What Hardware to Use?; How Do I Choose What Operating System to Use?; Speeding Up Your Snort Installation; Benchmarking Your Deployment; Summary; Solutions Fast Track
Frequently Asked QuestionsChapter 11. Mucking Around with Barnyard; Introduction; What Is Barnyard?; Preparation and Installation of Barnyard; How Does Barnyard Work?; What Are the Output Options for Barnyard?; But I Want My Output Like ""This""; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 12. Advanced Snort; Introduction; Policy-Based IDS; Inline IDS; Summary; Solutions Fast Track; Frequently Asked Questions; Index; GNU GENERAL PUBLIC LICENSE; TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION; END OF TERMS AND CONDITIONS
SYNGRESS PUBLISHING LICENSE AGREEMENT
Record Nr. UNINA-9910816736803321
Beale Jay  
Rockland, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui