|
Showing 1 - 2 of
2 matches in All Departments
This all new book covering the brand new Snort version 2.6 from
members of the Snort developers team.
This fully integrated book and Web toolkit covers everything from
packet inspection to optimizing Snort for speed to using the most
advanced features of Snort to defend even the largest and most
congested enterprise networks. Leading Snort experts Brian Caswell,
Andrew Baker, and Jay Beale analyze traffic from real attacks to
demonstrate the best practices for implementing the most powerful
Snort features.
Thecompanion materialcontains examples from real attacks allowing
readers test their new skills. The book will begin with a
discussion of packet inspection and the progression from intrusion
detection to intrusion prevention. The authors provide examples of
packet inspection methods including: protocol standards compliance,
protocol anomaly detection, application control, and signature
matching. In addition, application-level vulnerabilities including
Binary Code in HTTP headers, HTTP/HTTPS Tunneling, URL Directory
Traversal, Cross-Site Scripting, and SQL Injection will also be
analyzed. Next, a brief chapter on installing and configuring Snort
will highlight various methods for fine tuning your installation to
optimize Snort performance including hardware/OS selection, finding
and eliminating bottlenecks, and benchmarking and testing your
deployment. A special chapter also details how to use Barnyard to
improve the overall performance of Snort. Next, best practices will
be presented allowing readers to enhance the performance of Snort
for even the largest and most complex networks. The next chapter
reveals the inner workings of Snort by analyzing the source code.
The next several chapters will detail how to write, modify, and
fine-tune basic to advanced rules and pre-processors. Detailed
analysis of real packet captures will be provided both in the book
and the companion material. Several examples for optimizing output
plugins will then be discussed including a comparison of MySQL and
PostrgreSQL. Best practices for monitoring Snort sensors and
analyzing intrusion data follow with examples of real world attacks
using: ACID, BASE, SGUIL, SnortSnarf, Snort_stat.pl, Swatch, and
more.
The last part of the book contains several chapters on active
response, intrusion prevention, and using Snort s most advanced
capabilities for everything from forensics and incident handling to
building and analyzing honey pots. Data from real world attacks
will be presented throughout this part as well as on the companion
website, http: //booksite.elsevier.com/9781597490993/
This fully integrated book and Web toolkit covers everything all in
one convenient package It is authored by members of the Snort team
and it is packed full of their experience and expertiseIncludes
full coverage of the brand new Snort version 2.6, packed full of
all the latest informationCompanion website at http:
//booksite.elsevier.com/9781597490993/contains all companion
material"
The first two books in this series "Stealing the Network: How to
Own the Box" and "Stealing the Network: How to Own a Continent"
have become classics in the Hacker and Infosec communities because
of their chillingly realistic depictions of criminal hacking
techniques.
In this third installment, the all-star cast of authors tackle one
of the fastest growing crimes in the world: Identity Theft. Now,
the criminal hackers readers have grown to both love and hate try
to cover their tracks and vanish into thin air... "Stealing the
Network: How to Own an Identity" is the 3rd book in the "Stealing"
series, and continues in the tradition created by its predecessors
by delivering real-world network attack methodologies and hacking
techniques within a context of unique and original fictional
accounts created by some of the world's leading security
professionals and computer technologists. The seminal works in
TechnoFiction, this "STN" collection yet again breaks new ground by
casting light upon the mechanics and methods used by those lurking
on the darker side of the Internet, engaging in the fastest growing
crime in the world: Identity theft.
Cast upon a backdrop of "Evasion," surviving characters from "How
to Own a Continent" find themselves on the run, fleeing from both
authority and adversary, now using their technical prowess in a way
they never expected--to survive.
* The first two books in the series were best-sellers and have
established a cult following within the Hacker and Infosec
communities
* Identity theft is the fastest growing crime in the world, and
financial loss from identity theft is expected to reach $2 trillion
by the end of 2005
* All of the authors on thebook are world renowned, highly visible
information security experts who present at all of the top security
conferences including Black Hat, DefCon, and RSA and write for the
most popular magazines and Web sites including Information Security
Magazine, and SecurityFocus.com. All of these outlets will be used
to promote the book
|
You may like...
Sing 2
Blu-ray disc
R210
Discovery Miles 2 100
|