Snort 2.1 Intrusion Detection 2nd Edition.pdf
(
12941 KB
)
Pobierz
About the First Edition of
Snort Intrusion Detection
Overall, I found "Snort 2.0" enlightening. The authors have a powerful
understanding of the workings of Snort, and apply it in novel ways.
—Richard Bejtlich, Top 500 Amazon Reviewer
Would I recommend this book to someone already running Snort?
Yes! Would I recommend this book to someone considering
deploying an IDS? Heck yes! If you attempt to deploy Snort on a pro
duction network without reading this book you should be instantly
teleported out of your organization and into the "welcome to
Walmart" greeter position at the nearest bigbox store of the world's
largest corporation.
—Stephen Northcutt, Director, SANs Institute
First, Brian Caswell knows more about Snort than anyone on the
planet and it shows here. Secondly, the book is over 500 pages long,
and is full of configuration examples. It is the ONE Snort book you
need if you're actually running a corporate IDS. This pig flies. Highly
recommended.
—A Reader from Austin, TX
This book has proven to be a breath of fresh air. It provides detailed
product specifics and is a reliable roadmap to actually rolling out an
IDS. And I really appreciate the CD with Snort and the other IDS
utilities. The author team is well connected with Snort.org and they
obviously had cart blanche in writing this book.
—A Reader from Chestnut Hill, MA
"An awesome book by Snort gurus! This is an incredible book by the
guys from snort.org and Sourcefire—this book is just great and
covers everything I could ever have thought to ask about Snort 2.0.
—A Syngress customer
Register for Free Membership to
solutions@syngress.com
Over the last few years, Syngress has published many best-selling and
critically acclaimed books, including Tom Shinder’s
Configuring ISA
Server 2000,
Brian Caswell and Jay Beale’s
Snort 2.0 Intrusion
Detection,
and Angela Orebaugh and Gilbert Ramirez’s
Ethereal
Packet Sniffing.
One of the reasons for the success of these books has
been our unique
solutions@syngress.com
program. Through this
site, we’ve been able to provide readers a real time extension to the
printed book.
As a registered owner of this book, you will qualify for free access to
our members-only solutions@syngress.com program. Once you have
registered, you will enjoy several benefits, including:
■
Four downloadable e-booklets on topics related to the book.
Each booklet is approximately 20-30 pages in Adobe PDF
format. They have been selected by our editors from other
best-selling Syngress books as providing topic coverage that
is directly related to the coverage in this book.
A comprehensive FAQ page that consolidates all of the key
points of this book into an easy to search web page, pro
viding you with the concise, easy to access data you need to
perform your job.
A “From the Author” Forum that allows the authors of this
book to post timely updates links to related sites, or addi
tional topic coverage that may have been requested by
readers.
■
■
Just visit us at
www.syngress.com/solutions
and follow the simple
registration process. You will need to have this book with you when
you register.
Thank you for giving us the opportunity to serve your needs. And be
sure to let us know if there is anything else we can do to make your
job easier.
SECOND EDITION OF
THE INTERNATIONAL
BESTSELLER!
Snort 2.1
Intrusion Detection
Foreword by Stephen Northcutt
with
Raven Alder • Jacob Babbin •Jay Beale
Adam Doxtater • James C. Foster
Toby Kohlenberg •Michael Rash
Second
Edition
Featuring the Snort
Development Team
Andrew R. Baker
Brian Caswell
Mike Poor
Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc
tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be
obtained from the Work.
There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is
sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to
state.
In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other
incidental or consequential damages arising out from the Work or its contents. Because some states do not
allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation
may not apply to you.
You should always use reasonable care, including backup and other appropriate precautions, when working
with computers, networks, data, and files.
Snort™ and the Snort™ pig logo are trademarks of Sourcefire, Inc.
Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author
UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc. “Syngress:The
Definition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is
to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned
in this book are trademarks or service marks of their respective companies.
KEY
001
002
003
004
005
006
007
008
009
010
SERIAL NUMBER
TCVGH39764
POFG398HB5
8NJH2GAWW2
HJIRTCV764
CVQ23MZX43
VB544DM78X
HJJ3EDC7NB
2WMKEE329N
62T7NC9MW5
IM6TGH62N5
PUBLISHED BY
Syngress Publishing, Inc.
800 Hingham Street
Rockland, MA 02370
Snort 2.1 Intrusion Detection, Second Edition
Copyright © 2004 by Syngress Publishing, Inc. All rights reserved. Printed in the United States of
America. Except as permitted under the Copyright Act of 1976, no part of this publication may be repro
duced or distributed in any form or by any means, or stored in a database or retrieval system, without the
prior written permission of the publisher, with the exception that the program listings may be entered,
stored, and executed in a computer system, but they may not be reproduced for publication.
Printed in the United States of America
1 2 3 4 5 6 7 8 9 0
ISBN: 1-931836-04-3
Cover Designer: Michael Kavish
Copy Editor: Beth Roberts
Indexer: Nara Wood
Page Layout and Art: Patricia Lupien
Distributed by O’Reilly & Associates in the United States and Canada.
Acquisitions Editor: Christine Kloiber
Technical Editors: Jay Beale, Brian Caswell,
Toby Kohlenberg, and Mike Poor
Plik z chomika:
jacek_040
Inne pliki z tego folderu:
Exploiting Web-Based Applications - FREE Video Training Course PART 1.rar
(506812 KB)
Exploiting Web-Based Applications - FREE Video Training Course PART 2.rar
(933817 KB)
50 Android Hacks.pdf
(3465 KB)
50 Reasons For Mastering Penetration Testing.azw3
(171 KB)
610.1 - Malware Analysis Fundamentals.pdf
(31650 KB)
Inne foldery tego chomika:
Zgłoś jeśli
naruszono regulamin