Nessus, Snort, and Ethereal Power Tools : Customizing Open Source Security Applications by Jay Beale, Noam Rathaus, Brian Caswell and Gilbert Ramirez (2005, Perfect)

ThriftBooks (4030710)
99.1% positive feedback
Price:
US $8.91
(inclusive of GST)
ApproximatelyS$ 11.48
+ $22.89 shipping
Estimated delivery Thu, 23 Oct - Mon, 3 Nov
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Condition:
Very Good

About this product

Product Identifiers

PublisherElsevier Science & Technology Books
ISBN-101597490202
ISBN-139781597490207
eBay Product ID (ePID)109345288

Product Key Features

Number of Pages400 Pages
LanguageEnglish
Publication NameNessus, Snort, and Ethereal Power Tools : Customizing Open Source Security Applications
Publication Year2005
SubjectComputer Science, Security / General, Security / Networking, Interactive & Multimedia
TypeTextbook
AuthorJay Beale, Noam Rathaus, Brian Caswell, Gilbert Ramirez
Subject AreaComputers
FormatPerfect

Dimensions

Item Height0.9 in
Item Weight26.1 Oz
Item Length9 in
Item Width7 in

Additional Product Features

Intended AudienceScholarly & Professional
IllustratedYes
Table Of ContentPart I: Nessus Tools The Inner Workings of NASL Debugging NASLs; Extensions and Custom Tests Understanding the Extended Capabilities of the Nessus Environment Analyzing GetFileVersion and MySQL Passwordless Test Automating the Creation of NASLs Part II: Snort Tools The Inner Workings of Snort Snort Rules Plugins and Preprocessors Modifying Snort Part III: Etherial Tools Capture file Formats Protocol Dissectors Reporting from Etherial Appendix A Host Integrity Monitoring Using Osiris and Samhain
SynopsisNessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book., Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. Snort, Nessus, and Ethereal are the three most popular open source security tools in the world Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters Companion Web site provides all working code and scripts from the book for download

All listings for this product

Buy It Now
Pre-owned
No ratings or reviews yet
Be the first to write a review