Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Nessus, Snort, & Ethereal power tool...
~
Archibald, Neil.
Nessus, Snort, & Ethereal power toolscustomizing open source security applications /
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Nessus, Snort, & Ethereal power tools/ Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison.
其他題名:
customizing open source security applications /
其他題名:
Nessus, Snort, and Ethereal power tools
作者:
Archibald, Neil.
其他作者:
Ramirez, Gilbert,
出版者:
Rockland, MA :Syngress ;c2005.
面頁冊數:
xxvi, 445 p. :ill. ;24 cm.
附註:
Includes index.
叢書名:
Jay Beale's open source security series
標題:
Computer networks - Security measures. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080489421 (electronic bk.)
ISBN:
0080489427 (electronic bk.)
ISBN:
9781597490207 (paper)
ISBN:
1597490202 (paper)
Nessus, Snort, & Ethereal power toolscustomizing open source security applications /
Archibald, Neil.
Nessus, Snort, & Ethereal power tools
customizing open source security applications /[electronic resource] :Nessus, Snort, and Ethereal power toolsNeil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. - Rockland, MA :Syngress ;c2005. - xxvi, 445 p. :ill. ;24 cm. - Jay Beale's open source security series.
Includes index.
Part I: Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; Part II: Snort Tools; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Part III: Etherial Tools; Capture file Formats; Protocol Dissectors; Reporting from Etherial; Appendix A Host Integrity Monitoring Using Osiris and Samhain.
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. * Snort, Nessus, and Ethereal are the three most popular open source security tools in the world * Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters * Companion Web site provides all working code and scripts from the book for download.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080489421 (electronic bk.)Subjects--Topical Terms:
146868
Computer networks
--Security measures.Index Terms--Genre/Form:
172687
Electronic books.
LC Class. No.: TK5105.59 / .A734 2005eb
Dewey Class. No.: 005.8
Nessus, Snort, & Ethereal power toolscustomizing open source security applications /
LDR
:03419cmm 22003374a 4500
001
1000045986
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
070806s2005 maua s 001 0 eng d
020
$a
9780080489421 (electronic bk.)
020
$a
0080489427 (electronic bk.)
020
$a
9781597490207 (paper)
020
$a
1597490202 (paper)
035
$a
(OCoLC)162597293
035
$a
ocn162597293
040
$a
OPELS
$c
OPELS
$d
OPELS
050
1 4
$a
TK5105.59
$b
.A734 2005eb
082
0 4
$a
005.8
$2
22{me_controlnum}
100
1
$a
Archibald, Neil.
$3
1000060508
245
1 0
$a
Nessus, Snort, & Ethereal power tools
$h
[electronic resource] :
$b
customizing open source security applications /
$c
Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison.
246
3
$a
Nessus, Snort, and Ethereal power tools
246
3 0
$a
Customizing open source security applications
260
$a
Rockland, MA :
$b
Syngress ;
$a
[Sebastopol, Calif.] :
$b
Distributed by O'Reilly Media,
$c
c2005.
300
$a
xxvi, 445 p. :
$b
ill. ;
$c
24 cm.
440
0
$a
Jay Beale's open source security series
500
$a
Includes index.
505
0
$a
Part I: Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; Part II: Snort Tools; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Part III: Etherial Tools; Capture file Formats; Protocol Dissectors; Reporting from Etherial; Appendix A Host Integrity Monitoring Using Osiris and Samhain.
520
$a
This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. * Snort, Nessus, and Ethereal are the three most popular open source security tools in the world * Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters * Companion Web site provides all working code and scripts from the book for download.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 2, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
146868
650
0
$a
Open source software.
$3
165345
655
7
$a
Electronic books.
$2
local.
$3
172687
700
1
$a
Ramirez, Gilbert,
$d
1972-
$3
1000060509
700
1
$a
Rathaus, Noam.
$3
1000060510
710
2
$a
Syngress Media, Inc.
$3
148148
710
2
$a
ScienceDirect (Online service)
$3
1000060142
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597490207
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597490207
$z
An electronic book accessible through the World Wide Web; click for information
0 筆讀者評論
館藏地:
全部
線上資料庫
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0040143
線上資料庫
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入