My Account Log in

4 options

Nessus, Snort, & Ethereal power tools : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; Josh Burke, Brian Caswell, Renaud Deraison,technical editor[s].

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Archibald, Neil.
Contributor:
Burke, Josh.
Caswell, Brian.
Deraison, Renaud.
Ramirez, Gilbert.
Rathaus, Noam.
Series:
Jay Beale's open source security series.
Jay Beale's open source security series
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Computer security.
Open source software.
Physical Description:
1 online resource (472 p.)
Edition:
1st edition
Other Title:
Customizing open source security applications
Nessus, Snort, and Ethereal power tools
Place of Publication:
Rockland, Mass. : Syngress Pub., c2005.
Language Note:
English
System Details:
text file
Summary:
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff? their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest? open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most com
Contents:
Cover; Contents; Foreword; Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Capture File Formats; Protocol Dissectors; Reporting from Ethereal; Host Integrity Monitoring Using Osiris and Samhain; Index; Related Titles
Notes:
Includes index.
ISBN:
9786611035921
9781281035929
1281035920
9780080489421
0080489427
9781597499880
1597499889
OCLC:
181421113

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account