Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Programmer's Ultimate Security DeskRef
Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software...
Open Source Security Tools: Practical Guide to Security Applications, A
Open Source Security Tools: Practical Guide to Security Applications, A

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.

Written with the harried IT manager in mind, Open Source Security Tools is a practical,...

Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Snort for Dummies
Snort for Dummies
Find out how to foil an attack on your network

Choose the right way to deploy and configure Snort — no experience required!

Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you...

Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security)
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security)
One of the most attractive attributes of Nessus is the simplicity of creating custom extensions (or
plugins) to be run with the Nessus engine.This benefit is gained via the specialized language
NASL (Nessus Attack Scripting Language). NASL supplies the infrastructure to write networkbased
scripts without the need to implement the
...
Snort 2.0 Intrusion Detection
Snort 2.0 Intrusion Detection
“Intruder Alert! Intruder Alert! Warning,Will Robinson!” When we heard that
ominous announcement emanating from a robot as it twisted and turned with arms
thrashing and head spinning, we sat galvanized to our televisions waiting for the
intruder to reveal itself.Would this be the end of Will Robinson, as we knew him?...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy