Snort IDS and IPS toolkit
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team. This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and mos...
Saved in:
| Main Authors: | Beale, Jay (Author), Baker, Andrew R. (Author), Esler, Joel (Author) |
|---|---|
| Other Authors: | Kohlenberg, Toby (technical editor) |
| Format: | Book |
| Language: | English |
| Published: |
Burlington, MA
Syngress
2007
|
| Series: | Jay Beale's open source security series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
The Browser Hacker's Handbook
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Managing security with Snort and IDS tools
by: Cox, Kerry
Published: (2004)
by: Cox, Kerry
Published: (2004)
The Hacker's handbook the strategy behind breaking into and defending networks
by: Young lhSusan
by: Young lhSusan
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen
by: Cobb lhStephen
A NOVEL GRAPHICAL PASSWORD CLUSTERING METHOD FOR FAULT TOLERANCE MECHANISM
by: Mohd Sidek Fadhil Mohd Yunus
Published: (2020)
by: Mohd Sidek Fadhil Mohd Yunus
Published: (2020)
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
The antivirus hacker's handbook
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Client - side attacks and defense
by: Shimonski, Robert
Published: (2012)
by: Shimonski, Robert
Published: (2012)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Practical intrusion analysis prevention and detection for the twenty-first century
by: Trost, Ryan
Published: (2010)
by: Trost, Ryan
Published: (2010)
Pixel-based graphical password scheme password from digital image file
by: Mohd Sidek Fadzil Mohd Yunus, et al.
by: Mohd Sidek Fadzil Mohd Yunus, et al.
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Instruction detection network security beyond the firewall
by: Escamilla
Published: (1998)
by: Escamilla
Published: (1998)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
Internet and intranet security
by: OppligerlhRolf
by: OppligerlhRolf
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
Hacking exposed unified communications & VoIP security secrets & solutions
by: Collier, Mark D., et al.
Published: (2014)
by: Collier, Mark D., et al.
Published: (2014)
Impact of digital transformation on security policies and standards
Published: (2020)
Published: (2020)
Network security assessment know your network
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
Securing systems applied security architecture and threat models
by: Schoenfield, Brook S. E.
Published: (2015)
by: Schoenfield, Brook S. E.
Published: (2015)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
AAA identity management security
by: Santuka, Vivek
Published: (2011)
by: Santuka, Vivek
Published: (2011)
Network security, firewalls, and VPNs
by: Stewart, James Michael
Published: (2014)
by: Stewart, James Michael
Published: (2014)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Similar Items
-
The Browser Hacker's Handbook
by: Alcorn, Wade
Published: (2014) -
Web security for network and system administrators
by: Mackey, David
Published: (2003) -
Managing security with Snort and IDS tools
by: Cox, Kerry
Published: (2004) -
The Hacker's handbook the strategy behind breaking into and defending networks
by: Young lhSusan -
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen


