Nessus, Snort, & Ethereal power tools customizing open source security applications /

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source secur...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Archibald, Neil
Συλλογικό Έργο: ScienceDirect (Online Service), Syngress Media, Inc
Άλλοι συγγραφείς: Burke, Josh, RAMIREZ, Gilbert, Ramirez, Gilbert, 1972-, RATHAUS, Noam, Rathaus, Noam
Μορφή: Βιβλίο
Γλώσσα:English
Έκδοση: Rockland, MA : [Sebastopol, Calif.] : Syngress ; Distributed by O'Reilly Media, c2005.
Σειρά:Jay Beale's open source security series
Θέματα:
Διαθέσιμο Online:An electronic book accessible through the World Wide Web; click for information
LEADER 05053nam a2200589 a 4500
001 00169394
003 GR-PaULI
008 081112s2005 maua s d 001 0 eng d
020 |a 1597490202 
020 |a 9781597490207 
037 |a 114099:114192  |b Elsevier Science & Technology  |n http:/www.sciencedirect.com 
040 |a GrPaTEI  |b gre  |c GR-PaULI 
049 |a TEFA 
082 0 |a 005.8  |2 22  |q GR-KeIUL 
082 0 4 |a 005.8  |b ARC  |2 22  |q GrThTEI 
100 1 |a Archibald, Neil. 
245 1 0 |a Nessus, Snort, & Ethereal power tools  |h [ηλεκτρονική πηγή] :  |b customizing open source security applications /  |c Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. 
246 3 |a Nessus, Snort, and Ethereal power tools 
246 3 0 |a Customizing open source security applications 
260 |a Rockland, MA :  |b Syngress ;  |a [Sebastopol, Calif.] :  |b Distributed by O'Reilly Media,  |c c2005. 
300 |a xxvi, 445 σ. :  |b εικ. ;  |c 24 εκ. 
440 0 |a Jay Beale's open source security series 
500 |a Περιλαμβάνει ευρετήριο.  |5 GrThTEI 
500 |a ΤΠΛ  |5 GR-KeIUL;000236  |5 GR-KeIUL 
505 0 |a Part I: Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; Part II: Snort Tools; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Part III: Etherial Tools; Capture file Formats; Protocol Dissectors; Reporting from Etherial; Appendix A Host Integrity Monitoring Using Osiris and Samhain.  |9 GrThTEI 
506 |a Η πρόσβαση είναι περιορισμένη μόνο για τους χρήστες του δικτύου του ΑΤΕΙΘ.  |9 GrThTEI 
520 |a This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. * Snort, Nessus, and Ethereal are the three most popular open source security tools in the world * Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters * Companion Web site provides all working code and scripts from the book for download.  |9 GrThTEI 
533 |a Electronic reproduction.  |b Amsterdam :  |c Elsevier Science & Technology,  |d 2007.  |n Mode of access: World Wide Web.  |n System requirements: Web browser.  |n Title from title screen (viewed on Aug. 2, 2007).  |n Access may be restricted to users at subscribing institutions.  |5 GrThTEI 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Open source software. 
650 7 |a Ασφάλεια ηλεκτρονικών υπολογιστών  |2 lcsh/gre 
650 7 |a Δίκτυα ηλεκτρονικών υπολογιστών  |x Ασφαλιστικά μέτρα  |2 nlgaf 
650 7 |a Ηλεκτρονικοί υπολογιστές  |x Δίκτυα  |x Μέτρα ασφάλειας  |2 lcsh/gre 
650 7 |a Λογισμικό ανοικτού κώδικα  |2 lcsh/gre 
650 7 |a Λογισμικό ανοικτού κώδικα  |2 nlgaf 
655 7 |a Electronic books.  |2 local  |9 GrThTEI 
655 7 |a Ηλεκτρονικό βιβλίο  |2 nlgaf  |9 GrThTEI 
700 1 |a Burke, Josh 
700 1 |a RAMIREZ, Gilbert 
700 1 |a Ramirez, Gilbert,  |d 1972- 
700 1 |a RATHAUS, Noam 
700 1 |a Rathaus, Noam. 
710 2 |a ScienceDirect (Online Service) 
710 2 |a Syngress Media, Inc. 
776 1 |c Original  |z 1597490202  |z 9781597490207  |w (OCoLC)62293608  |9 GrThTEI 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781597490207  |z An electronic book accessible through the World Wide Web; click for information  |9 GrThTEI 
939 9 |a 200811141316  |b tsouka  |y 200811121417  |z staff 
942 |2 ddc 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_800000000000000_ARC  |7 0  |9 255666  |a LISK-2  |b LISK-2  |c BSC  |d 2021-01-17  |e 24  |f 0  |g 0.00  |l 0  |o 005.8 ARC  |p 99243000008686  |r 2021-01-17 00:00:00  |t 1  |w 2021-01-17  |y BK15  |x GrPaTEI - Antirrio 
952 |0 0  |1 0  |2 ddc  |4 0  |6 005_800000000000000_ARC  |7 0  |9 255667  |a LISK-2  |b LISK-2  |c BSC  |d 2021-01-17  |e 24  |f 0  |g 0.00  |l 0  |o 005.8 ARC  |p 99243000008687  |r 2021-01-17 00:00:00  |t 1  |w 2021-01-17  |y BK15  |x GrPaTEI - Antirrio 
971 |a .b23332025  |b 14-04-20  |c 15-09-15 
999 |c 149977  |d 149977