Managing Security with Snort & IDS Tools
By Kerry J. Cox, Christopher Gerg
Published by O'Reilly Media (http://oreilly.com/catalog/9780596006617/)
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.
Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?
Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs.
Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.
Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts.
Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
Superb Reading Features
Through a partnership between O'Reilly Media and Lexcycle, this app includes the same features that have made Stanza an iPhone phenomenon with over a million downloads:
* Full book text search
* Several fonts and themes to choose from
* Built-in dictionary
* The ability to add annotations
* Landscape view
* Extensive cross-referencing and working hyperlinks
* Zoom function for images and screenshots
About O'Reilly Media
O'Reilly Media spreads the knowledge of innovators through its books, online services, magazines, research, and conferences. Whether it's delivered in print, online, or in person, everything O'Reilly produces reflects the company's unshakeable belief in the power of information to spur innovation. Learn more about Ebooks from O'Reilly at oreilly.com/ebooks.
Lexcycle is the creator of Stanza Bookbinder which was used to create this standalone book application. Stanza Bookbinder is based on the popular iPhone Ebook reading application, Stanza. For more information about Stanza, visit www.lexcycle.com.
Share with Others
- Last changed:
- Dec 15, 2010
- O'Reilly Media, Inc.
- Average Rating:
- No data
- 6.7 MB
- Other Apps By This Developer
• Cooking for Geeks by Jeff Potter - Complete Book, Interactive Edition
• Fluent Conference – the Official Event App for the O’Reilly Fluent Conference
• HTML 4 & 5: The Complete Reference
• OSCON – the Official Event App for the O’Reilly Open Source Convention
• Strata – The Official Event App for O’Reilly Strata Conference
• Velocity Conference – the Official Event App for the O’Reilly Velocity Conference