Host integrity monitoring: using Osiris and Samhain
This book is about one of the most crucial aspects of system and security management: host integrity protection. Fundamentally, host integrity protection is all about understanding the changes that occur on your system friendly or hostile, deliberate or accidental and understanding the impact of tho...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress Pub.
© 2005
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | This book is about one of the most crucial aspects of system and security management: host integrity protection. Fundamentally, host integrity protection is all about understanding the changes that occur on your system friendly or hostile, deliberate or accidental and understanding the impact of those changes. In other words, it's change control in a potentially hostile environment. Best of all, this book is written by Brian Wotring, who has designed and deployed host integrity monitoring systems, used them, and relied on their results. It's hard to overstate the value of such experience. Book |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xxvi, 421 pages) illustrations |
ISBN: | 1597490180 9781597490184 0080488943 9780080488943 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124426 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2005 |||| o||u| ||||||eng d | ||
020 | |a 1597490180 |9 1-59749-018-0 | ||
020 | |a 9781597490184 |9 978-1-59749-018-4 | ||
020 | |a 0080488943 |9 0-08-048894-3 | ||
020 | |a 9780080488943 |9 978-0-08-048894-3 | ||
035 | |a (ZDB-33-ESD)ocm80241920 | ||
035 | |a (OCoLC)80241920 | ||
035 | |a (DE-599)BVBBV046124426 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Wotring, Brian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Host integrity monitoring |b using Osiris and Samhain |c Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum |
264 | 1 | |a Rockland, Mass. |b Syngress Pub. |c © 2005 | |
300 | |a 1 online resource (xxvi, 421 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a This book is about one of the most crucial aspects of system and security management: host integrity protection. Fundamentally, host integrity protection is all about understanding the changes that occur on your system friendly or hostile, deliberate or accidental and understanding the impact of those changes. In other words, it's change control in a potentially hostile environment. Best of all, this book is written by Brian Wotring, who has designed and deployed host integrity monitoring systems, used them, and relied on their results. It's hard to overstate the value of such experience. Book | ||
650 | 7 | |a COMPUTERS / Security / Networking |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Überwachung |2 gnd | |
650 | 4 | |a Computer security | |
650 | 4 | |a Web servers |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Potter, Bruce |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490184 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504880 | ||
347 | |a data file |2 rda | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597490184 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442423754752 |
---|---|
any_adam_object | |
author | Wotring, Brian |
author_facet | Wotring, Brian |
author_role | aut |
author_sort | Wotring, Brian |
author_variant | b w bw |
building | Verbundindex |
bvnumber | BV046124426 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm80241920 (OCoLC)80241920 (DE-599)BVBBV046124426 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02404nmm a2200481zc 4500</leader><controlfield tag="001">BV046124426</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490180</subfield><subfield code="9">1-59749-018-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490184</subfield><subfield code="9">978-1-59749-018-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080488943</subfield><subfield code="9">0-08-048894-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488943</subfield><subfield code="9">978-0-08-048894-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm80241920</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)80241920</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124426</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wotring, Brian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Host integrity monitoring</subfield><subfield code="b">using Osiris and Samhain</subfield><subfield code="c">Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 421 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is about one of the most crucial aspects of system and security management: host integrity protection. Fundamentally, host integrity protection is all about understanding the changes that occur on your system friendly or hostile, deliberate or accidental and understanding the impact of those changes. In other words, it's change control in a potentially hostile environment. Best of all, this book is written by Brian Wotring, who has designed and deployed host integrity monitoring systems, used them, and relied on their results. It's hard to overstate the value of such experience. Book</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Überwachung</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web servers</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Potter, Bruce</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490184</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504880</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490184</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124426 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 1597490180 9781597490184 0080488943 9780080488943 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504880 |
oclc_num | 80241920 |
open_access_boolean | |
physical | 1 online resource (xxvi, 421 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Wotring, Brian Verfasser aut Host integrity monitoring using Osiris and Samhain Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum Rockland, Mass. Syngress Pub. © 2005 1 online resource (xxvi, 421 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index This book is about one of the most crucial aspects of system and security management: host integrity protection. Fundamentally, host integrity protection is all about understanding the changes that occur on your system friendly or hostile, deliberate or accidental and understanding the impact of those changes. In other words, it's change control in a potentially hostile environment. Best of all, this book is written by Brian Wotring, who has designed and deployed host integrity monitoring systems, used them, and relied on their results. It's hard to overstate the value of such experience. Book COMPUTERS / Security / Networking bisacsh Computer security fast Computer networks / Security measures fast Computersicherheit gnd Überwachung gnd Computer security Web servers Security measures Computer networks Security measures Potter, Bruce Sonstige oth http://www.sciencedirect.com/science/book/9781597490184 Verlag URL des Erstveröffentlichers Volltext data file rda |
spellingShingle | Wotring, Brian Host integrity monitoring using Osiris and Samhain COMPUTERS / Security / Networking bisacsh Computer security fast Computer networks / Security measures fast Computersicherheit gnd Überwachung gnd Computer security Web servers Security measures Computer networks Security measures |
title | Host integrity monitoring using Osiris and Samhain |
title_auth | Host integrity monitoring using Osiris and Samhain |
title_exact_search | Host integrity monitoring using Osiris and Samhain |
title_full | Host integrity monitoring using Osiris and Samhain Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum |
title_fullStr | Host integrity monitoring using Osiris and Samhain Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum |
title_full_unstemmed | Host integrity monitoring using Osiris and Samhain Brian Wotring ; Bruce Potter, technical editor ; for[e]word by Marcus J. Ranum |
title_short | Host integrity monitoring |
title_sort | host integrity monitoring using osiris and samhain |
title_sub | using Osiris and Samhain |
topic | COMPUTERS / Security / Networking bisacsh Computer security fast Computer networks / Security measures fast Computersicherheit gnd Überwachung gnd Computer security Web servers Security measures Computer networks Security measures |
topic_facet | COMPUTERS / Security / Networking Computer security Computer networks / Security measures Computersicherheit Überwachung Web servers Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597490184 |
work_keys_str_mv | AT wotringbrian hostintegritymonitoringusingosirisandsamhain AT potterbruce hostintegritymonitoringusingosirisandsamhain |