Logo

Intrusion Detection with SNORT

Large book cover: Intrusion Detection with SNORT

Intrusion Detection with SNORT
by

Publisher: Prentice Hall PTR
ISBN/ASIN: 0131407333
ISBN-13: 9780131407336
Number of pages: 275

Description:
Network security has become an important part of corporate IT strategy and safeguarding all the nooks and crannies of your network can be timely and expensive. This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Rehman provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data. The book contains custom scripts, real-life examples for SNORT, and to-the-point information about installing SNORT IDS so readers can build and run their sophisticated intrusion detection systems.

Download or read it online for free here:
Download link
(2.5MB, PDF)

Similar books

Book cover: Firewalls and Internet Security: Repelling the Wily HackerFirewalls and Internet Security: Repelling the Wily Hacker
by - Addison-Wesley
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
(10765 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(12332 views)
Book cover: OpenSSHOpenSSH
- Wikibooks
The OpenSSH protocol suite provides secure remote access and file transfer. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.
(4892 views)
Book cover: Guide to Securing Intranet and Extranet ServersGuide to Securing Intranet and Extranet Servers
- VeriSign
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(7160 views)