Sie befinden Sich nicht im Netzwerk der Universität Paderborn. Der Zugriff auf elektronische Ressourcen ist gegebenenfalls nur via VPN oder Shibboleth (DFN-AAI) möglich. mehr Informationen...
Ergebnis 17 von 421

Details

Autor(en) / Beteiligte
Titel
Nessus, Snort, & Ethereal power tools : customizing open source security applications [electronic resource]
Auflage
1st edition
Link zum Volltext
Beschreibungen/Notizen
  • Includes index.
  • Cover; Contents; Foreword; Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Capture File Formats; Protocol Dissectors; Reporting from Ethereal; Host Integrity Monitoring Using Osiris and Samhain; Index; Related Titles
  • This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff? their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest? open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most com
  • English
Sprache
Englisch
Identifikatoren
ISBN: 1-281-03592-0, 9786611035921, 0-08-048942-7, 1-59749-988-9
OCLC-Nummer: 181421113, 935230463, 319430068, ocm319430068
Titel-ID: 9925193876906463
Format
1 online resource (472 p.)
Schlagworte
Computer networks, Computer security, Open source software