Snort 2.1 intrusion detection /:
Called ""the leader in the Snort IDS book arms race"" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Writ...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2004.
|
Ausgabe: | 2nd ed. |
Schriftenreihe: | Jay Beale's open source security series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Called ""the leader in the Snort IDS book arms race"" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of S |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource. |
ISBN: | 1932266844 9781932266849 9781931836043 1931836043 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm55597380 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 040605s2004 mau o 001 0 eng d | ||
010 | |z 2004109410 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d WAU |d OCLCQ |d OKN |d TUU |d OCLCQ |d OCLCF |d NLGGC |d OCLCQ |d E7B |d YDXCP |d OCLCQ |d COO |d AGLDB |d PLS |d OCLCQ |d SAV |d OCLCO |d WY@ |d OCLCA |d LUE |d STF |d VTS |d INT |d TOF |d OCLCQ |d OCLCO |d G3B |d K6U |d VLY |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d N$T |d VT2 | ||
019 | |a 149295617 |a 648302124 |a 961599205 |a 962564167 |a 1035667653 |a 1153044228 | ||
020 | |a 1932266844 |q (electronic bk.) | ||
020 | |a 9781932266849 |q (electronic bk.) | ||
020 | |a 9781931836043 |q (electronic bk.) | ||
020 | |a 1931836043 |q (electronic bk.) | ||
020 | |z 1931836043 |q (pbk.) | ||
035 | |a (OCoLC)55597380 |z (OCoLC)149295617 |z (OCoLC)648302124 |z (OCoLC)961599205 |z (OCoLC)962564167 |z (OCoLC)1035667653 |z (OCoLC)1153044228 | ||
050 | 4 | |a TK5105.59 |b .B35 2004eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23/eng/20240320 | |
049 | |a MAIN | ||
100 | 1 | |a Baker, Andrew R. |0 http://id.loc.gov/authorities/names/no2005054692 | |
245 | 1 | 0 | |a Snort 2.1 intrusion detection / |c featuring the Snort Development Team, Andrew R. Baker, Brian Caswell, Mike Poor ; foreword by Stephen Northcutt ; with Raven Alder [and others]. |
250 | |a 2nd ed. | ||
260 | |a Rockland, MA : |b Syngress Pub., |c ©2004. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Jay Beale's open source security series | |
500 | |a Includes index. | ||
505 | 0 | |a Cover; Contents; Foreword; Intrusion Detection Systems; Introducing Snort 2.1; Installing Snort; Inner Workings; Playing by the Rules; Preprocessors; Implementing Snort Output Plug-Ins; Dealing with the Data; Keeping Everything Up to Date; Optimizing Snort; Mucking Around with Barnyard; Active Response; Advanced Snort; Index; Related Titles | |
520 | |a Called ""the leader in the Snort IDS book arms race"" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of S | ||
630 | 0 | 0 | |a Snort (Software) |0 http://id.loc.gov/authorities/names/no2010097375 |
630 | 0 | 7 | |a Snort (Software) |2 fast |
650 | 0 | |a Intrusion detection systems (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2010008203 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Systèmes de détection d'intrusion (Sécurité informatique) | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Intrusion detection systems (Computer security) |2 fast | |
700 | 1 | |a Caswell, Brian. |0 http://id.loc.gov/authorities/names/nb2004311577 | |
700 | 1 | |a Poor, Mike. |0 http://id.loc.gov/authorities/names/no2005054694 | |
758 | |i has work: |a Snort 2.1 Intrusion Detection (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGHYvPTjy6kyJHTxYbCgBq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Baker, Andrew R. |t Snort 2.1 intrusion detection. |b 2nd ed. |d Rockland, MA : SyngressPub, ©2004 |w (DLC) 2004109410 |
830 | 0 | |a Jay Beale's open source security series. |0 http://id.loc.gov/authorities/names/no2004036853 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109469 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 109469 | ||
938 | |a Internet Archive |b INAR |n snort21intrusion0000bake | ||
938 | |a YBP Library Services |b YANK |n 2361886 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm55597380 |
---|---|
_version_ | 1816881615593275392 |
adam_text | |
any_adam_object | |
author | Baker, Andrew R. |
author2 | Caswell, Brian Poor, Mike |
author2_role | |
author2_variant | b c bc m p mp |
author_GND | http://id.loc.gov/authorities/names/no2005054692 http://id.loc.gov/authorities/names/nb2004311577 http://id.loc.gov/authorities/names/no2005054694 |
author_facet | Baker, Andrew R. Caswell, Brian Poor, Mike |
author_role | |
author_sort | Baker, Andrew R. |
author_variant | a r b ar arb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .B35 2004eb |
callnumber-search | TK5105.59 .B35 2004eb |
callnumber-sort | TK 45105.59 B35 42004EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Contents; Foreword; Intrusion Detection Systems; Introducing Snort 2.1; Installing Snort; Inner Workings; Playing by the Rules; Preprocessors; Implementing Snort Output Plug-Ins; Dealing with the Data; Keeping Everything Up to Date; Optimizing Snort; Mucking Around with Barnyard; Active Response; Advanced Snort; Index; Related Titles |
ctrlnum | (OCoLC)55597380 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04399cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm55597380 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">040605s2004 mau o 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2004109410</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WAU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OKN</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">PLS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WY@</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">G3B</subfield><subfield code="d">K6U</subfield><subfield code="d">VLY</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">N$T</subfield><subfield code="d">VT2</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">149295617</subfield><subfield code="a">648302124</subfield><subfield code="a">961599205</subfield><subfield code="a">962564167</subfield><subfield code="a">1035667653</subfield><subfield code="a">1153044228</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266844</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266849</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836043</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836043</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1931836043</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55597380</subfield><subfield code="z">(OCoLC)149295617</subfield><subfield code="z">(OCoLC)648302124</subfield><subfield code="z">(OCoLC)961599205</subfield><subfield code="z">(OCoLC)962564167</subfield><subfield code="z">(OCoLC)1035667653</subfield><subfield code="z">(OCoLC)1153044228</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.B35 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240320</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Baker, Andrew R.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2005054692</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Snort 2.1 intrusion detection /</subfield><subfield code="c">featuring the Snort Development Team, Andrew R. Baker, Brian Caswell, Mike Poor ; foreword by Stephen Northcutt ; with Raven Alder [and others].</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Jay Beale's open source security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Contents; Foreword; Intrusion Detection Systems; Introducing Snort 2.1; Installing Snort; Inner Workings; Playing by the Rules; Preprocessors; Implementing Snort Output Plug-Ins; Dealing with the Data; Keeping Everything Up to Date; Optimizing Snort; Mucking Around with Barnyard; Active Response; Advanced Snort; Index; Related Titles</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Called ""the leader in the Snort IDS book arms race"" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of S</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Snort (Software)</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010097375</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Snort (Software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intrusion detection systems (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2010008203</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes de détection d'intrusion (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intrusion detection systems (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Caswell, Brian.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2004311577</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Poor, Mike.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2005054694</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Snort 2.1 Intrusion Detection (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGHYvPTjy6kyJHTxYbCgBq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Baker, Andrew R.</subfield><subfield code="t">Snort 2.1 intrusion detection.</subfield><subfield code="b">2nd ed.</subfield><subfield code="d">Rockland, MA : SyngressPub, ©2004</subfield><subfield code="w">(DLC) 2004109410</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Jay Beale's open source security series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004036853</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109469</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">109469</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">snort21intrusion0000bake</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361886</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm55597380 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:32Z |
institution | BVB |
isbn | 1932266844 9781932266849 9781931836043 1931836043 |
language | English |
oclc_num | 55597380 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource. |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress Pub., |
record_format | marc |
series | Jay Beale's open source security series. |
series2 | Jay Beale's open source security series |
spelling | Baker, Andrew R. http://id.loc.gov/authorities/names/no2005054692 Snort 2.1 intrusion detection / featuring the Snort Development Team, Andrew R. Baker, Brian Caswell, Mike Poor ; foreword by Stephen Northcutt ; with Raven Alder [and others]. 2nd ed. Rockland, MA : Syngress Pub., ©2004. 1 online resource. text txt rdacontent computer c rdamedia online resource cr rdacarrier Jay Beale's open source security series Includes index. Cover; Contents; Foreword; Intrusion Detection Systems; Introducing Snort 2.1; Installing Snort; Inner Workings; Playing by the Rules; Preprocessors; Implementing Snort Output Plug-Ins; Dealing with the Data; Keeping Everything Up to Date; Optimizing Snort; Mucking Around with Barnyard; Active Response; Advanced Snort; Index; Related Titles Called ""the leader in the Snort IDS book arms race"" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities. Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of S Snort (Software) http://id.loc.gov/authorities/names/no2010097375 Snort (Software) fast Intrusion detection systems (Computer security) http://id.loc.gov/authorities/subjects/sh2010008203 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Systèmes de détection d'intrusion (Sécurité informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Intrusion detection systems (Computer security) fast Caswell, Brian. http://id.loc.gov/authorities/names/nb2004311577 Poor, Mike. http://id.loc.gov/authorities/names/no2005054694 has work: Snort 2.1 Intrusion Detection (Text) https://id.oclc.org/worldcat/entity/E39PCGHYvPTjy6kyJHTxYbCgBq https://id.oclc.org/worldcat/ontology/hasWork Print version: Baker, Andrew R. Snort 2.1 intrusion detection. 2nd ed. Rockland, MA : SyngressPub, ©2004 (DLC) 2004109410 Jay Beale's open source security series. http://id.loc.gov/authorities/names/no2004036853 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109469 Volltext |
spellingShingle | Baker, Andrew R. Snort 2.1 intrusion detection / Jay Beale's open source security series. Cover; Contents; Foreword; Intrusion Detection Systems; Introducing Snort 2.1; Installing Snort; Inner Workings; Playing by the Rules; Preprocessors; Implementing Snort Output Plug-Ins; Dealing with the Data; Keeping Everything Up to Date; Optimizing Snort; Mucking Around with Barnyard; Active Response; Advanced Snort; Index; Related Titles Snort (Software) http://id.loc.gov/authorities/names/no2010097375 Snort (Software) fast Intrusion detection systems (Computer security) http://id.loc.gov/authorities/subjects/sh2010008203 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Systèmes de détection d'intrusion (Sécurité informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Intrusion detection systems (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/names/no2010097375 http://id.loc.gov/authorities/subjects/sh2010008203 http://id.loc.gov/authorities/subjects/sh90001862 https://id.nlm.nih.gov/mesh/D016494 |
title | Snort 2.1 intrusion detection / |
title_auth | Snort 2.1 intrusion detection / |
title_exact_search | Snort 2.1 intrusion detection / |
title_full | Snort 2.1 intrusion detection / featuring the Snort Development Team, Andrew R. Baker, Brian Caswell, Mike Poor ; foreword by Stephen Northcutt ; with Raven Alder [and others]. |
title_fullStr | Snort 2.1 intrusion detection / featuring the Snort Development Team, Andrew R. Baker, Brian Caswell, Mike Poor ; foreword by Stephen Northcutt ; with Raven Alder [and others]. |
title_full_unstemmed | Snort 2.1 intrusion detection / featuring the Snort Development Team, Andrew R. Baker, Brian Caswell, Mike Poor ; foreword by Stephen Northcutt ; with Raven Alder [and others]. |
title_short | Snort 2.1 intrusion detection / |
title_sort | snort 2 1 intrusion detection |
topic | Snort (Software) http://id.loc.gov/authorities/names/no2010097375 Snort (Software) fast Intrusion detection systems (Computer security) http://id.loc.gov/authorities/subjects/sh2010008203 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Systèmes de détection d'intrusion (Sécurité informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Intrusion detection systems (Computer security) fast |
topic_facet | Snort (Software) Intrusion detection systems (Computer security) Computer security. Computer Security Systèmes de détection d'intrusion (Sécurité informatique) Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=109469 |
work_keys_str_mv | AT bakerandrewr snort21intrusiondetection AT caswellbrian snort21intrusiondetection AT poormike snort21intrusiondetection |