Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
This book provides an introduction to the field of Intrusion
Prevention and provides detailed information on various IPS methods
and technologies. Specific methods are covered in depth, including
both network and host IPS and response technologies such as port
deactivation, firewall/router network layer ACL modification,
session sniping, outright application layer data modification,
system call interception, and application shims.
Nmap, or Network Mapper, is a free, open source tool that is
available under the GNU General Public License as published by the
Free Software Foundation. It is most often used by network
administrators and IT security professionals to scan corporate
networks, looking for live hosts, specific services, or specific
operating systems. Part of the beauty of Nmap is its ability to
create IP packets from scratch and send them out utilizing unique
methodologies to perform the above-mentioned types of scans and
more. This book provides comprehensive coverage of all Nmap
features, including detailed, real-world case studies.
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new "Snort Cookbook" will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT. Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The "Snort Cookbook" covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the "Snort Cookbook" offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solveimmediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
This publication discusses the fundamental technologies and features of SSL VPNs. It describes SSL and how it fits within the context of layered network security. It presents a phased approach to SSL VPN planning and implementation that can help in achieving successful SSL VPN deployments. It also compares the SSL VPN technology with IPsec VPNs and other VPN solutions. This information is particularly valuable for helping organizations to determine how best to deploy SSL VPNs within their specific network environments.
The Perfect Reference for the Multitasked SysAdmin
|
You may like...
|