Snort for Dummies

Snort for Dummies

2 (1 rating by Goodreads)
By (author)  , By (author)  , By (author) 

List price: US$29.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

Snort is the world's most widely deployed open source intrusion-detection system, with more than 500,000 downloads-a package that can perform protocol analysis, handle content searching and matching, and detect a variety of attacks and probes Drawing on years of security experience and multiple Snort implementations, the authors guide readers through installation, configuration, and management of Snort in a busy operations environment No experience with intrusion detection systems (IDS) required Shows network administrators how to plan an IDS implementation, identify how Snort fits into a security management environment, deploy Snort on Linux and Windows systems, understand and create Snort detection rules, generate reports with ACID and other tools, and discover the nature and source of attacks in real time CD-ROM includes Snort, ACID, and a variety of management toolsshow more

Product details

  • CD-ROM | 372 pages
  • 188 x 230 x 26mm | 621.43g
  • John Wiley & Sons Inc
  • Hungry Minds Inc,U.S.
  • Foster City, United States
  • English
  • 0764568353
  • 9780764568350
  • 1,797,449

Back cover copy

Find out how to foil an attack on your network Choose the right way to deploy and configure Snort -- no experience required! Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you train Snort to do your bidding. Discover how intrusion detection systems work, what kind you need, how to install and manage Snort on Linux(R) or Windows(R) systems, and more. All this on the bonus CD-ROM Snort Intrusion Detection System for Linux and Windows ACID Snort Visualization Console Barnyard unified logging tool and Oinkmaster rule manager Assorted other Snort management tools Discover how to: Integrate Snort into your security plan Decide on the best deployment Create and update detection rules Generate reports with ACID Get real-time alerts in case of attackshow more

About Charlie Scott

Charlie Scott is an Information Security Analyst for the City of Austin, where he helps maintain the City's network security infrastructure and helps analyze intrusion detection data. He has nearly ten years of experience in the Internet industry and has been an avid user of open source security software that entire time. Charlie is a Certified Information Systems Security Professional (CISSP) and a Cisco Certified Network Professional (CCNP). Bert Hayes is a Security Technical Analyst for the State of Texas, where he maintains network security for a medium sized agency. In Bert's ten years of IT industry experience, he has done everything from managing a corporate IT shop during a successful IPO to performing white hat penetration tests for corporate and government offices. He has long been a proponent of open source solutions, and is a Red Hat Certified Engineer (RHCE). Paul Wolfe is an independent information security consultant and author, specializing in open source security.show more

Table of contents

Introduction. Part I: Getting to Know Snort and Intrusion Detection. Chapter 1: Looking Up Snort's Nose. Chapter 2: Fitting In Snort. Chapter 3: Readying Your Preflight Checklist. Chapter 4: Makin' Bacon: Installing Snort for Linux. Chapter 5: Installing Snort and MySQL for Windows. Part II: Administering Your Snort Box. Chapter 6: Snorting Through Logs and Alerts. Chapter 7: Adding Visuals and Getting Reports. Chapter 8: Making Your Own Rules. Chapter 9: What, Me Worry? Chapter 10: Dealing with the Real Thing. Part III: Moving Beyond the Basics. Chapter 11: Reacting in Real Time. Chapter 12: Keeping Snort Up to Date. Chapter 13: Filling Your Farm with Pigs. Chapter 14: Using the Barnyard Output Tool. Part IV: The Part of Tens. Chapter 15: Ten Cool Tools for Snort. Chapter 16: Ten Snort Information Resources. Appendix A: What's On the CD-ROM. Index.show more

Rating details

1 ratings
2 out of 5 stars
5 0% (0)
4 0% (0)
3 0% (0)
2 100% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X