Εικόνα εξωφύλλου από Amazon
Εξώφυλλο από Amazon.com
Κανονική προβολή Προβολή MARC Προβολή ISBD

Nessus, Snort, & Ethereal power tools [ηλεκτρονική πηγή] : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison.

Κατά: Συντελεστής(ές): Τύπος υλικού: ΚείμενοΚείμενοΣειρά: Jay Beale's open source security seriesΛεπτομέρειες δημοσίευσης: Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, c2005.Περιγραφή: xxvi, 445 σ. : εικ. ; 24 εκISBN:
  • 1597490202
  • 9781597490207
Άλλος τίτλος:
  • Nessus, Snort, and Ethereal power tools
  • Customizing open source security applications
Θέμα(τα): Είδος/Μορφή: Επιπρόσθετες φυσικές μορφές: No titleΤαξινόμηση DDC:
  • 005.8 22
  • 005.8 ARC 22
Πηγές στο διαδίκτυο:
Περιεχόμενα:
Part I: Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; Part II: Snort Tools; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Part III: Etherial Tools; Capture file Formats; Protocol Dissectors; Reporting from Etherial; Appendix A Host Integrity Monitoring Using Osiris and Samhain.
Περίληψη: This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. * Snort, Nessus, and Ethereal are the three most popular open source security tools in the world * Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters * Companion Web site provides all working code and scripts from the book for download.
Αντίτυπα
Τύπος τεκμηρίου Τρέχουσα βιβλιοθήκη Ταξιθετικός αριθμός Αριθμός αντιτύπου Κατάσταση Ημερομηνία λήξης Ραβδοκώδικας
Book [21] Book [21] ΒΚΠ - Κουκούλι (Πα.Πελ.) Βασική Συλλογή 005.8 ARC (Περιήγηση στο ράφι(Άνοιγμα παρακάτω)) 1 Διαθέσιμο 99243000008686
Book [21] Book [21] ΒΚΠ - Κουκούλι (Πα.Πελ.) Βασική Συλλογή 005.8 ARC (Περιήγηση στο ράφι(Άνοιγμα παρακάτω)) 1 Διαθέσιμο 99243000008687

Περιλαμβάνει ευρετήριο. GrThTEI

ΤΠΛ GR-KeIUL;000236 GR-KeIUL

Part I: Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; Part II: Snort Tools; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Part III: Etherial Tools; Capture file Formats; Protocol Dissectors; Reporting from Etherial; Appendix A Host Integrity Monitoring Using Osiris and Samhain. GrThTEI

Η πρόσβαση είναι περιορισμένη μόνο για τους χρήστες του δικτύου του ΑΤΕΙΘ. GrThTEI

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. * Snort, Nessus, and Ethereal are the three most popular open source security tools in the world * Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters * Companion Web site provides all working code and scripts from the book for download. GrThTEI

Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2007. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on Aug. 2, 2007). Access may be restricted to users at subscribing institutions. GrThTEI

Πανεπιστήμιο Πατρών, Βιβλιοθήκη & Κέντρο Πληροφόρησης, 265 04, Πάτρα
Τηλ: 2610969621, Φόρμα επικοινωνίας
Εικονίδιο Facebook Εικονίδιο Twitter Εικονίδιο Soundcloud