Book description
The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments.Snort 2.0 Intrusion Detection is written by a member of Snort.org. The book provides a valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios.
The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds.
- The most up-to-date and comprehensive coverage for Snort 2.0!
- Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Acknowledgments
- Contributors
- Technical Advisors
- Technical Reviewer
- Technical Editor
- Foreword
- Chapter 1: Intrusion Detection Systems
- Chapter 2: Introducing Snort 2.0
- Chapter 3: Installing Snort
- Chapter 4: Snort: The Inner Workings
- Chapter 5: Playing by the Rules
-
Chapter 6: Preprocessors
- Introduction
- What Is a Preprocessor?
- Preprocessor Options for Reassembling Packets
- Preprocessor Options for Decoding and Normalizing Protocols
- Preprocessor Options for Nonrule or Anomaly-Based Detection
- Experimental Preprocessors
- Writing Your Own Preprocessor
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 7: Implementing Snort Output Plug-Ins
- Chapter 8: Exploring the Data Analysis Tools
- Chapter 9: Keeping Everything Up to Date
- Chapter 10: Optimizing Snort
- Chapter 11: Mucking Around with Barnyard
- Chapter 12: Advanced Snort
- Index
Product information
- Title: Snort Intrusion Detection 2.0
- Author(s):
- Release date: May 2003
- Publisher(s): Syngress
- ISBN: 9780080481005
You might also like
book
Snort 2.1 Intrusion Detection, Second Edition
Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, …
book
Snort Intrusion Detection and Prevention Toolkit
This all new book covering the brand new Snort version 2.6 from members of the Snort …
book
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review …
book
Intrusion Detection Networks
The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use …