LEADER 00000nam a22004693i 4500 
001    EBC294371 
003    MiAaPQ 
005    20200713055117.0 
006    m     o  d |       
007    cr cnu|||||||| 
008    200713s2003    xx      o     ||||0 eng d 
020    9780080481005|q(electronic bk.) 
020    |z9781931836746 
035    (MiAaPQ)EBC294371 
035    (Au-PeEL)EBL294371 
035    (CaPaEBR)ebr10026374 
035    (CaONFJC)MIL105609 
035    (OCoLC)935246404 
040    MiAaPQ|beng|erda|epn|cMiAaPQ|dMiAaPQ 
050  4 TK5105.59 -- .B42 2003eb 
082 0  005.8 
100 1  Syngress Media, Inc. Staff 
245 10 Snort Intrusion Detection 2. 0 
250    1st ed 
264  1 Rockland :|bElsevier Science & Technology Books,|c2003 
264  4 |c©2003 
300    1 online resource (559 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
505 0  Front Cover -- Snort 2.0 Intrusion Detection -- Copyright 
       Page -- Contents -- Chapter 1. Intrusion Detection Systems
       -- Introduction -- What Is Intrusion Detection? -- A 
       Trilogy of Vulnerabilities -- Why Are Intrusion Detection 
       Systems Important? -- Summary -- Solutions Fast Track -- 
       Frequently Asked Questions -- Chapter 2. Introducing Snort
       2.0 -- Introduction -- What Is Snort? -- Snort System 
       Requirements -- Exploring Snort's Features -- Using Snort 
       on Your Network -- Security Considerations with Snort -- 
       Summary -- Solutions Fast Track -- Frequently Asked 
       Questions -- Chapter 3. Installing Snort -- Introduction -
       - A Brief Word about Linux Distributions -- Installing 
       PCAP -- Installing Snort -- Summary -- Solutions Fast 
       Track -- Frequently Asked Questions -- Chapter 4. Snort: 
       The Inner Workings -- Introduction -- Snort Components -- 
       Decoding Packets -- Processing Packets 101 -- 
       Understanding Rule Parsing and Detection Engines -- Output
       and Logs -- Summary -- Solutions Fast Track -- Frequently 
       Asked Questions -- Chapter 5. Playing by the Rules -- 
       Introduction -- Understanding Configuration Files -- The 
       Rule Header -- The Rule Body -- Components of a Good Rule 
       -- Testing Your Rules -- Tuning Your Rules -- Summary -- 
       Solutions Fast Track -- Frequently Asked Questions -- 
       Chapter 6. Preprocessors -- Introduction -- What Is a 
       Preprocessor? -- Preprocessor Options for Reassembling 
       Packets -- Preprocessor Options for Decoding and 
       Normalizing Protocols -- Preprocessor Options for Nonrule 
       or Anomaly-Based Detection -- Experimental Preprocessors -
       - Writing Your Own Preprocessor -- Summary -- Solutions 
       Fast Track -- Frequently Asked Questions -- Chapter 7. 
       Implementing Snort Output Plug-Ins -- Introduction -- What
       Is an Output Plug-In? -- Exploring Output Plug-In Options 
       -- Writing Your Own Output Plug-In -- Summary -- Solutions
       Fast Track 
505 8  Frequently Asked Questions -- Chapter 8. Exploring the 
       Data Analysis Tools -- Introduction -- Using Swatch -- 
       Using ACID -- Using SnortSnarf -- Using IDScenter -- 
       Summary -- Solutions Fast Track -- Frequently Asked 
       Questions -- Chapter 9. Keeping Everything Up to Date -- 
       Introduction -- Applying Patches -- Updating Rules -- 
       Testing Rule Updates -- Watching for Updates -- Summary --
       Solutions Fast Track -- Frequently Asked Questions -- 
       Chapter 10. Optimizing Snort -- Introduction -- How Do I 
       Choose What Hardware to Use? -- How Do I Choose What 
       Operating System to Use? -- Speeding Up Your Snort 
       Installation -- Benchmarking Your Deployment -- Summary --
       Solutions Fast Track -- Frequently Asked Questions -- 
       Chapter 11. Mucking Around with Barnyard -- Introduction -
       - What Is Barnyard? -- Preparation and Installation of 
       Barnyard -- How Does Barnyard Work? -- What Are the Output
       Options for Barnyard? -- But I Want My Output Like "This" 
       -- Summary -- Solutions Fast Track -- Frequently Asked 
       Questions -- Chapter 12. Advanced Snort -- Introduction --
       Policy-Based IDS -- Inline IDS -- Summary -- Solutions 
       Fast Track -- Frequently Asked Questions -- Index -- GNU 
       GENERAL PUBLIC LICENSE -- TERMS AND CONDITIONS FOR COPYING,
       DISTRIBUTION AND MODIFICATION -- END OF TERMS AND 
       CONDITIONS -- SYNGRESS PUBLISHING LICENSE AGREEMENT 
520    The incredible low maintenance costs of Snort combined 
       with its powerful security features make it one of the 
       fastest growing IDSs within corporate IT departments. 
       Snort 2.0 Intrusion Detection is written by a member of 
       Snort.org. The book provides a valuable insight to the 
       code base of Snort and in-depth tutorials of complex 
       installation, configuration, and troubleshooting 
       scenarios. The primary reader will be an individual who 
       has a working knowledge of the TCP/IP protocol, expertise 
       in some arena of IT infrastructure, and is inquisitive 
       about what has been attacking their IT network perimeter 
       every 15 seconds. The most up-to-date and comprehensive 
       coverage for Snort 2.0! Expert Advice from the Development
       Team and Step-by-Step Instructions for Installing, 
       Configuring, and Troubleshooting the Snort 2.0 Intrusion 
       Detection System 
588    Description based on publisher supplied metadata and other
       sources 
590    Electronic reproduction. Ann Arbor, Michigan : ProQuest 
       Ebook Central, 2020. Available via World Wide Web. Access 
       may be limited to ProQuest Ebook Central affiliated 
       libraries 
650  0 Computer networks -- Security measures.;Computer security 
655  4 Electronic books 
700 1  Foster, James C 
700 1  Posluns, Jeffrey 
776 08 |iPrint version:|aSyngress Media, Inc. Staff|tSnort 
       Intrusion Detection 2. 0|dRockland : Elsevier Science & 
       Technology Books,c2003|z9781931836746 
856 40 |uhttps://ebookcentral.proquest.com/lib/sinciatw/
       detail.action?docID=294371|zClick to View