Nessus, Snort, and Ethereal Power Tools Nessus, Snort, and Ethereal Power Tools

Nessus, Snort, and Ethereal Power Tools

Customizing Open Source Security Applications

Brian Caswell and Others
    • $43.99
    • $43.99

Publisher Description

Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. Snort, Nessus, and Ethereal are the three most popular open source security tools in the world Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters Companion Web site provides all working code and scripts from the book for download

GENRE
Computing & Internet
RELEASED
2005
14 September
LANGUAGE
EN
English
LENGTH
400
Pages
PUBLISHER
Elsevier Science
SELLER
Elsevier Ltd.
SIZE
21.1
MB
Network Security Tools Network Security Tools
2005
Network Programmability and Automation Fundamentals Network Programmability and Automation Fundamentals
2021
Black Hat Go Black Hat Go
2020
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Enhanced Edition) Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Enhanced Edition)
2005
Gray Hat Hacking the Ethical Hacker's Gray Hat Hacking the Ethical Hacker's
2021
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
2015
Mike Mike
2015
A Cage of Butterflies A Cage of Butterflies
2015
Only The Heart Only The Heart
2015
Deucalion Deucalion
2013
Asturias Asturias
2015
The View from Ararat The View from Ararat
2013