Snort 2.0 intrusion detection:
The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
© 2003
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System Free CD Contains the Latest Version of Snort and Popular Plug-Ins Including ACID, Barnyard, and Swatch |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource (xxv, 523 pages) illustrations |
ISBN: | 1932266747 9781932266740 9781931836746 1931836744 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124550 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2003 |||| o||u| ||||||eng d | ||
020 | |a 1932266747 |9 1-932266-74-7 | ||
020 | |a 9781932266740 |9 978-1-932266-74-0 | ||
020 | |a 9781931836746 |9 978-1-931836-74-6 | ||
020 | |a 1931836744 |9 1-931836-74-4 | ||
035 | |a (ZDB-33-ESD)ocm52730213 | ||
035 | |a (OCoLC)52730213 | ||
035 | |a (DE-599)BVBBV046124550 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Beale, Jay |e Verfasser |4 aut | |
245 | 1 | 0 | |a Snort 2.0 intrusion detection |c Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor |
264 | 1 | |a Rockland, MA |b Syngress |c © 2003 | |
300 | |a 1 online resource (xxv, 523 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System Free CD Contains the Latest Version of Snort and Popular Plug-Ins Including ACID, Barnyard, and Swatch | ||
630 | 0 | 4 | |a Snort (Software) |
650 | 7 | |a Snort (Software) |2 fast | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Intrusion detection systems (Computer security) |2 fast | |
650 | 4 | |a Intrusion detection systems (Computer security) | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Snort 2.0 |0 (DE-588)4749435-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Snort 2.0 |0 (DE-588)4749435-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Foster, James C. |e Sonstige |4 oth | |
700 | 1 | |a Posluns, Jeffrey |e Sonstige |4 oth | |
700 | 1 | |a Caswell, Brian |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836746 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505004 | ||
347 | |a data file |2 rda | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781931836746 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442699530240 |
---|---|
any_adam_object | |
author | Beale, Jay |
author_facet | Beale, Jay |
author_role | aut |
author_sort | Beale, Jay |
author_variant | j b jb |
building | Verbundindex |
bvnumber | BV046124550 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm52730213 (OCoLC)52730213 (DE-599)BVBBV046124550 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03156nmm a2200565zc 4500</leader><controlfield tag="001">BV046124550</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266747</subfield><subfield code="9">1-932266-74-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266740</subfield><subfield code="9">978-1-932266-74-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836746</subfield><subfield code="9">978-1-931836-74-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836744</subfield><subfield code="9">1-931836-74-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm52730213</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52730213</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124550</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beale, Jay</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Snort 2.0 intrusion detection</subfield><subfield code="c">Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxv, 523 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System Free CD Contains the Latest Version of Snort and Popular Plug-Ins Including ACID, Barnyard, and Swatch</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Snort (Software)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Snort (Software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intrusion detection systems (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intrusion detection systems (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Snort 2.0</subfield><subfield code="0">(DE-588)4749435-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Snort 2.0</subfield><subfield code="0">(DE-588)4749435-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foster, James C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Posluns, Jeffrey</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Caswell, Brian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836746</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505004</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836746</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124550 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 1932266747 9781932266740 9781931836746 1931836744 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505004 |
oclc_num | 52730213 |
open_access_boolean | |
physical | 1 online resource (xxv, 523 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Syngress |
record_format | marc |
spelling | Beale, Jay Verfasser aut Snort 2.0 intrusion detection Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor Rockland, MA Syngress © 2003 1 online resource (xxv, 523 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System Free CD Contains the Latest Version of Snort and Popular Plug-Ins Including ACID, Barnyard, and Swatch Snort (Software) Snort (Software) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Intrusion detection systems (Computer security) fast Intrusion detection systems (Computer security) Computer security Snort 2.0 (DE-588)4749435-9 gnd rswk-swf Snort 2.0 (DE-588)4749435-9 s 1\p DE-604 Foster, James C. Sonstige oth Posluns, Jeffrey Sonstige oth Caswell, Brian Sonstige oth http://www.sciencedirect.com/science/book/9781931836746 Verlag URL des Erstveröffentlichers Volltext data file rda 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Beale, Jay Snort 2.0 intrusion detection Snort (Software) Snort (Software) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Intrusion detection systems (Computer security) fast Intrusion detection systems (Computer security) Computer security Snort 2.0 (DE-588)4749435-9 gnd |
subject_GND | (DE-588)4749435-9 |
title | Snort 2.0 intrusion detection |
title_auth | Snort 2.0 intrusion detection |
title_exact_search | Snort 2.0 intrusion detection |
title_full | Snort 2.0 intrusion detection Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor |
title_fullStr | Snort 2.0 intrusion detection Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor |
title_full_unstemmed | Snort 2.0 intrusion detection Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor |
title_short | Snort 2.0 intrusion detection |
title_sort | snort 2 0 intrusion detection |
topic | Snort (Software) Snort (Software) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Intrusion detection systems (Computer security) fast Intrusion detection systems (Computer security) Computer security Snort 2.0 (DE-588)4749435-9 gnd |
topic_facet | Snort (Software) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Intrusion detection systems (Computer security) Snort 2.0 |
url | http://www.sciencedirect.com/science/book/9781931836746 |
work_keys_str_mv | AT bealejay snort20intrusiondetection AT fosterjamesc snort20intrusiondetection AT poslunsjeffrey snort20intrusiondetection AT caswellbrian snort20intrusiondetection |