Logo

Snort Cookbook by A. Orebaugh, S. Biles, J. Babbin

Large book cover: Snort Cookbook

Snort Cookbook
by

Publisher: O'Reilly Media
ISBN/ASIN: 0596007914
ISBN-13: 9780596007911

Description:
Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: Information Security and Privacy in Network EnvironmentsInformation Security and Privacy in Network Environments
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(7258 views)
Book cover: Firewalls and Internet Security: Repelling the Wily HackerFirewalls and Internet Security: Repelling the Wily Hacker
by - Addison-Wesley
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
(13685 views)
Book cover: Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by - Puget Sound Software
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
(12447 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(16016 views)