Ebook453 pages8 hours
Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications
Rating: 0 out of 5 stars
()
About this ebook
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.
- Snort, Nessus, and Ethereal are the three most popular open source security tools in the world
- Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters
- Companion Web site provides all working code and scripts from the book for download
Read more from Brian Caswell
A Cage of Butterflies Rating: 4 out of 5 stars4/5Double Exposure Rating: 4 out of 5 stars4/5Only The Heart Rating: 3 out of 5 stars3/5Deucalion Rating: 3 out of 5 stars3/5Mike Rating: 4 out of 5 stars4/5Loop Rating: 1 out of 5 stars1/5View from Ararat Rating: 0 out of 5 stars0 ratingsAsturias Rating: 3 out of 5 stars3/5Snort 2.1 Intrusion Detection, Second Edition Rating: 4 out of 5 stars4/5Lisdalia Rating: 4 out of 5 stars4/5Snort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5
Related to Nessus, Snort, and Ethereal Power Tools
Related ebooks
Snort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsZero-Day Exploit: Countdown to Darkness Rating: 2 out of 5 stars2/5Perfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5WarDriving and Wireless Penetration Testing Rating: 5 out of 5 stars5/5Snort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Syngress Force Emerging Threat Analysis: From Mischief to Malicious Rating: 0 out of 5 stars0 ratingsWindows to Linux Migration Toolkita: Your Windows to Linux Extreme Makeover Rating: 0 out of 5 stars0 ratingsNetwork Security Assessment: From Vulnerability to Patch Rating: 0 out of 5 stars0 ratingsWireshark & Ethereal Network Protocol Analyzer Toolkit Rating: 0 out of 5 stars0 ratingsInsider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Rating: 0 out of 5 stars0 ratingsHow to Cheat at Configuring ISA Server 2004 Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime: Computer Forensics Handbook Rating: 4 out of 5 stars4/5How to Cheat at Managing Microsoft Operations Manager 2005 Rating: 0 out of 5 stars0 ratingsSnort 2.1 Intrusion Detection, Second Edition Rating: 4 out of 5 stars4/5Intrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services Rating: 0 out of 5 stars0 ratingsAsterisk Hacking Rating: 0 out of 5 stars0 ratingsCombating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat Rating: 4 out of 5 stars4/5InfoSec Career Hacking: Sell Your Skillz, Not Your Soul Rating: 3 out of 5 stars3/5Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5Mobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsCuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsSeven Deadliest Network Attacks Rating: 3 out of 5 stars3/5The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsEthereal Packet Sniffing Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing for Highly-Secured Environments - Second Edition Rating: 0 out of 5 stars0 ratings
Computers For You
Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Python Machine Learning By Example Rating: 4 out of 5 stars4/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsSQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsElon Musk Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling Rating: 0 out of 5 stars0 ratingsThe Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5
Reviews for Nessus, Snort, and Ethereal Power Tools
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Nessus, Snort, and Ethereal Power Tools - Brian Caswell
Enjoying the preview?
Page 1 of 1