Book description
Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities.Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of Snort, and in depth tutorials of complex installation, configuration, and troubleshooting scenarios. Snort has three primary uses: as a straight packet sniffer, a packet logger, or as a full-blown network intrusion detection system. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes. Snort uses a flexible rules language to describe traffic that it should collect or pass, a detection engine that utilizes a modular plug-in architecture, and a real-time alerting capability. A CD containing the latest version of Snort as well as other up-to-date Open Source security utilities will accompany the book.
Snort is a powerful Network Intrusion Detection System that can provide enterprise wide sensors to protect your computer assets from both internal and external attack.
* Completly updated and comprehensive coverage of snort 2.1
* Includes free CD with all the latest popular plug-ins
* Provides step-by-step instruction for installing, configuring and troubleshooting
Table of contents
- Cover (1/3)
- Cover (2/3)
- Cover (3/3)
- Contents (1/4)
- Contents (2/4)
- Contents (3/4)
- Contents (4/4)
- Foreword
- Intrusion Detection Systems (1/11)
- Intrusion Detection Systems (2/11)
- Intrusion Detection Systems (3/11)
- Intrusion Detection Systems (4/11)
- Intrusion Detection Systems (5/11)
- Intrusion Detection Systems (6/11)
- Intrusion Detection Systems (7/11)
- Intrusion Detection Systems (8/11)
- Intrusion Detection Systems (9/11)
- Intrusion Detection Systems (10/11)
- Intrusion Detection Systems (11/11)
- Introducing Snort 2.1 (1/10)
- Introducing Snort 2.1 (2/10)
- Introducing Snort 2.1 (3/10)
- Introducing Snort 2.1 (4/10)
- Introducing Snort 2.1 (5/10)
- Introducing Snort 2.1 (6/10)
- Introducing Snort 2.1 (7/10)
- Introducing Snort 2.1 (8/10)
- Introducing Snort 2.1 (9/10)
- Introducing Snort 2.1 (10/10)
- Installing Snort (1/14)
- Installing Snort (2/14)
- Installing Snort (3/14)
- Installing Snort (4/14)
- Installing Snort (5/14)
- Installing Snort (6/14)
- Installing Snort (7/14)
- Installing Snort (8/14)
- Installing Snort (9/14)
- Installing Snort (10/14)
- Installing Snort (11/14)
- Installing Snort (12/14)
- Installing Snort (13/14)
- Installing Snort (14/14)
- Inner Workings (1/4)
- Inner Workings (2/4)
- Inner Workings (3/4)
- Inner Workings (4/4)
- Playing by the Rules (1/10)
- Playing by the Rules (2/10)
- Playing by the Rules (3/10)
- Playing by the Rules (4/10)
- Playing by the Rules (5/10)
- Playing by the Rules (6/10)
- Playing by the Rules (7/10)
- Playing by the Rules (8/10)
- Playing by the Rules (9/10)
- Playing by the Rules (10/10)
- Preprocessors (1/16)
- Preprocessors (2/16)
- Preprocessors (3/16)
- Preprocessors (4/16)
- Preprocessors (5/16)
- Preprocessors (6/16)
- Preprocessors (7/16)
- Preprocessors (8/16)
- Preprocessors (9/16)
- Preprocessors (10/16)
- Preprocessors (11/16)
- Preprocessors (12/16)
- Preprocessors (13/16)
- Preprocessors (14/16)
- Preprocessors (15/16)
- Preprocessors (16/16)
- Implementing Snort Output Plug-Ins (1/14)
- Implementing Snort Output Plug-Ins (2/14)
- Implementing Snort Output Plug-Ins (3/14)
- Implementing Snort Output Plug-Ins (4/14)
- Implementing Snort Output Plug-Ins (5/14)
- Implementing Snort Output Plug-Ins (6/14)
- Implementing Snort Output Plug-Ins (7/14)
- Implementing Snort Output Plug-Ins (8/14)
- Implementing Snort Output Plug-Ins (9/14)
- Implementing Snort Output Plug-Ins (10/14)
- Implementing Snort Output Plug-Ins (11/14)
- Implementing Snort Output Plug-Ins (12/14)
- Implementing Snort Output Plug-Ins (13/14)
- Implementing Snort Output Plug-Ins (14/14)
- Dealing with the Data (1/13)
- Dealing with the Data (2/13)
- Dealing with the Data (3/13)
- Dealing with the Data (4/13)
- Dealing with the Data (5/13)
- Dealing with the Data (6/13)
- Dealing with the Data (7/13)
- Dealing with the Data (8/13)
- Dealing with the Data (9/13)
- Dealing with the Data (10/13)
- Dealing with the Data (11/13)
- Dealing with the Data (12/13)
- Dealing with the Data (13/13)
- Keeping Everything Up to Date (1/6)
- Keeping Everything Up to Date (2/6)
- Keeping Everything Up to Date (3/6)
- Keeping Everything Up to Date (4/6)
- Keeping Everything Up to Date (5/6)
- Keeping Everything Up to Date (6/6)
- Optimizing Snort (1/12)
- Optimizing Snort (2/12)
- Optimizing Snort (3/12)
- Optimizing Snort (4/12)
- Optimizing Snort (5/12)
- Optimizing Snort (6/12)
- Optimizing Snort (7/12)
- Optimizing Snort (8/12)
- Optimizing Snort (9/12)
- Optimizing Snort (10/12)
- Optimizing Snort (11/12)
- Optimizing Snort (12/12)
- Mucking Around with Barnyard (1/16)
- Mucking Around with Barnyard (2/16)
- Mucking Around with Barnyard (3/16)
- Mucking Around with Barnyard (4/16)
- Mucking Around with Barnyard (5/16)
- Mucking Around with Barnyard (6/16)
- Mucking Around with Barnyard (7/16)
- Mucking Around with Barnyard (8/16)
- Mucking Around with Barnyard (9/16)
- Mucking Around with Barnyard (10/16)
- Mucking Around with Barnyard (11/16)
- Mucking Around with Barnyard (12/16)
- Mucking Around with Barnyard (13/16)
- Mucking Around with Barnyard (14/16)
- Mucking Around with Barnyard (15/16)
- Mucking Around with Barnyard (16/16)
- Active Response (1/14)
- Active Response (2/14)
- Active Response (3/14)
- Active Response (4/14)
- Active Response (5/14)
- Active Response (6/14)
- Active Response (7/14)
- Active Response (8/14)
- Active Response (9/14)
- Active Response (10/14)
- Active Response (11/14)
- Active Response (12/14)
- Active Response (13/14)
- Active Response (14/14)
- Advanced Snort (1/6)
- Advanced Snort (2/6)
- Advanced Snort (3/6)
- Advanced Snort (4/6)
- Advanced Snort (5/6)
- Advanced Snort (6/6)
- Index (1/5)
- Index (2/5)
- Index (3/5)
- Index (4/5)
- Index (5/5)
- Related Titles
Product information
- Title: Snort 2.1 Intrusion Detection, Second Edition
- Author(s):
- Release date: June 2004
- Publisher(s): Syngress
- ISBN: 9780080480992
You might also like
book
Snort Intrusion Detection 2.0
The incredible low maintenance costs of Snort combined with its powerful security features make it one …
book
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review …
book
SSFIPS Securing Cisco Networks with Sourcefire Intrusion Prevention System Study Guide: Exam 500-285
Up the ante on your FirePOWER with Advanced FireSIGHT Administration exam prep Securing Cisco Networks with …
video
Securing Your Network from Attacks
Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that …