WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/801559986

Nessus, Snort, & Ethereal power tools customizing open source security applications

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. Snort, Nessus, and Ethereal are the three most popular open source security tools in the world. This is the only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters. The Companion Web site provides all working code and scripts from the book for download.

Open All Close All

http://schema.org/about

http://schema.org/alternateName

  • "Customizing open source security applications"@en
  • "Customizing open source security applications"
  • "Nessus, Snort, and Ethereal power tools"@en
  • "Nessus, Snort, and Ethereal power tools"

http://schema.org/description

  • "This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. Snort, Nessus, and Ethereal are the three most popular open source security tools in the world. This is the only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters. The Companion Web site provides all working code and scripts from the book for download."@en
  • "Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts."@en
  • "This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. * Snort, Nessus, and Ethereal are the three most popular open source security tools in the world * Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters * Companion Web site provides all working code and scripts from the book for download."

http://schema.org/genre

  • "Llibres electrònics"
  • "Ressources internet"
  • "Electronic resource"@en
  • "Electronic books"@en
  • "Electronic books"
  • "Online-Publikation"

http://schema.org/name

  • "Nessus, Snort, and Ethereal Power Tools : customizing Open Source Security applications"
  • "Nessus, Snort, & Ethereal power tools customizing open source security applications"@en
  • "Nessus, Snort, & Ethereal power tools customizing open source security applications"
  • "Nessus, Snort, and Ethereal Power Tools Customizing Open Source Security Applications"@en
  • "Nessus, Snort, & Ethereal power tools : customizing open source security applications"@en
  • "Nessus, Snort, & Ethereal power tools : customizing open source security applications"
  • "Nessus, snort, & ethereal power tools customizing open source security applications"@en