Snort 2.0 intrusion detection /:
The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2003.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System Free CD Contains the Latest Version of Snort and Popular Plug-Ins Including ACID, Barnyard, and Swatch. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xxv, 523 pages :) |
ISBN: | 1932266747 9781932266740 9781931836746 1931836744 9786611056094 6611056092 0080481000 9780080481005 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm52730213 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030728s2003 maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d WAU |d OCLCQ |d TUU |d OCLCQ |d TNF |d OCLCQ |d OCLCF |d OCLCO |d NLGGC |d VOD |d CEF |d OPELS |d MERUC |d CCO |d E7B |d HNW |d EBLCP |d REDDC |d DKDLA |d FVL |d SINTU |d OCLCQ |d MUX |d DEBSZ |d OCLCQ |d AZK |d LOA |d AGLDB |d COCUF |d CNNOR |d MOR |d PIFBR |d LIV |d OCLCQ |d OCLCO |d WY@ |d U3W |d OCLCA |d LUE |d STF |d BRL |d WRM |d D6H |d VTS |d NRAMU |d INT |d VT2 |d TOF |d OCLCQ |d OCLCO |d AU@ |d COO |d WYU |d A6Q |d OCLCQ |d OCLCO |d LEAUB |d OL$ |d NLW |d OCLCO |d OCLCQ |d VLY |d INARC |d OCL |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
015 | |a GBA3Z8900 |2 bnb | ||
016 | 7 | |a 009725792 |2 Uk | |
019 | |a 56812754 |a 57363231 |a 70751981 |a 162598926 |a 181842474 |a 475715849 |a 559533483 |a 646713809 |a 722153984 |a 728005745 |a 729550825 |a 733802710 |a 748108681 |a 759521878 |a 888355536 |a 961568537 |a 961623463 |a 962581879 |a 962633538 |a 966203083 |a 988476987 |a 991988652 |a 992049570 |a 1035714813 |a 1037511712 |a 1038678486 |a 1045479264 |a 1053046974 |a 1055361351 |a 1058175936 |a 1076286853 |a 1081277540 |a 1151242949 |a 1162247089 |a 1228560764 | ||
020 | |a 1932266747 |q (electronic bk.) | ||
020 | |a 9781932266740 |q (electronic bk.) | ||
020 | |a 9781931836746 | ||
020 | |a 1931836744 | ||
020 | |a 9786611056094 | ||
020 | |a 6611056092 | ||
020 | |a 0080481000 | ||
020 | |a 9780080481005 | ||
035 | |a (OCoLC)52730213 |z (OCoLC)56812754 |z (OCoLC)57363231 |z (OCoLC)70751981 |z (OCoLC)162598926 |z (OCoLC)181842474 |z (OCoLC)475715849 |z (OCoLC)559533483 |z (OCoLC)646713809 |z (OCoLC)722153984 |z (OCoLC)728005745 |z (OCoLC)729550825 |z (OCoLC)733802710 |z (OCoLC)748108681 |z (OCoLC)759521878 |z (OCoLC)888355536 |z (OCoLC)961568537 |z (OCoLC)961623463 |z (OCoLC)962581879 |z (OCoLC)962633538 |z (OCoLC)966203083 |z (OCoLC)988476987 |z (OCoLC)991988652 |z (OCoLC)992049570 |z (OCoLC)1035714813 |z (OCoLC)1037511712 |z (OCoLC)1038678486 |z (OCoLC)1045479264 |z (OCoLC)1053046974 |z (OCoLC)1055361351 |z (OCoLC)1058175936 |z (OCoLC)1076286853 |z (OCoLC)1081277540 |z (OCoLC)1151242949 |z (OCoLC)1162247089 |z (OCoLC)1228560764 | ||
037 | |a 100814:100827 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .B43 2003eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Beale, Jay. | |
245 | 1 | 0 | |a Snort 2.0 intrusion detection / |c Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor. |
260 | |a Rockland, MA : |b Syngress, |c ©2003. | ||
300 | |a 1 online resource (xxv, 523 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
520 | |a The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System Free CD Contains the Latest Version of Snort and Popular Plug-Ins Including ACID, Barnyard, and Swatch. | ||
505 | 0 | |a Cover Contents Intrusion Detection Systems Introducing Snort 2.0 Installing Snort Snort: The Inner Workings Playing by the Rules Preprocessors Implementing Snort Output Plug-Ins. | |
546 | |a English. | ||
630 | 0 | 0 | |a Snort (Software) |0 http://id.loc.gov/authorities/names/no2010097375 |
630 | 0 | 7 | |a Snort (Software) |2 fast |
650 | 0 | |a Intrusion detection systems (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2010008203 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 6 | |a Systèmes de détection d'intrusion (Sécurité informatique) | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Intrusion detection systems (Computer security) |2 fast | |
650 | 7 | |a Snort 2.0 |2 gnd |0 http://d-nb.info/gnd/4749435-9 | |
700 | 1 | |a Foster, James C. | |
700 | 1 | |a Posluns, Jeffrey. | |
700 | 1 | |a Caswell, Brian. | |
758 | |i has work: |a Snort 2.0 intrusion detection (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGxD34B4Pd3x9BTDmbGbkC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Beale, Jay. |t Snort 2.0 intrusion detection. |d Rockland, MA : Syngress, ©2003 |z 1931836744 |w (OCoLC)52274199 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85658 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85658 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836746 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836746 |3 Volltext | |
938 | |a ProQuest Ebook Central |b EBLB |n EBL157386 | ||
938 | |a EBSCOhost |b EBSC |n 85658 | ||
938 | |a Internet Archive |b INAR |n snort20intrusion00beal | ||
938 | |a YBP Library Services |b YANK |n 2361882 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm52730213 |
---|---|
_version_ | 1813903266284568576 |
adam_text | |
any_adam_object | |
author | Beale, Jay |
author2 | Foster, James C. Posluns, Jeffrey Caswell, Brian |
author2_role | |
author2_variant | j c f jc jcf j p jp b c bc |
author_facet | Beale, Jay Foster, James C. Posluns, Jeffrey Caswell, Brian |
author_role | |
author_sort | Beale, Jay |
author_variant | j b jb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .B43 2003eb |
callnumber-search | TK5105.59 .B43 2003eb |
callnumber-sort | TK 45105.59 B43 42003EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover Contents Intrusion Detection Systems Introducing Snort 2.0 Installing Snort Snort: The Inner Workings Playing by the Rules Preprocessors Implementing Snort Output Plug-Ins. |
ctrlnum | (OCoLC)52730213 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05793cam a2200793 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm52730213 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030728s2003 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WAU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">NLGGC</subfield><subfield code="d">VOD</subfield><subfield code="d">CEF</subfield><subfield code="d">OPELS</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">HNW</subfield><subfield code="d">EBLCP</subfield><subfield code="d">REDDC</subfield><subfield code="d">DKDLA</subfield><subfield code="d">FVL</subfield><subfield code="d">SINTU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MUX</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AU@</subfield><subfield code="d">COO</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OL$</subfield><subfield code="d">NLW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VLY</subfield><subfield code="d">INARC</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA3Z8900</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">009725792</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">56812754</subfield><subfield code="a">57363231</subfield><subfield code="a">70751981</subfield><subfield code="a">162598926</subfield><subfield code="a">181842474</subfield><subfield code="a">475715849</subfield><subfield code="a">559533483</subfield><subfield code="a">646713809</subfield><subfield code="a">722153984</subfield><subfield code="a">728005745</subfield><subfield code="a">729550825</subfield><subfield code="a">733802710</subfield><subfield code="a">748108681</subfield><subfield code="a">759521878</subfield><subfield code="a">888355536</subfield><subfield code="a">961568537</subfield><subfield code="a">961623463</subfield><subfield code="a">962581879</subfield><subfield code="a">962633538</subfield><subfield code="a">966203083</subfield><subfield code="a">988476987</subfield><subfield code="a">991988652</subfield><subfield code="a">992049570</subfield><subfield code="a">1035714813</subfield><subfield code="a">1037511712</subfield><subfield code="a">1038678486</subfield><subfield code="a">1045479264</subfield><subfield code="a">1053046974</subfield><subfield code="a">1055361351</subfield><subfield code="a">1058175936</subfield><subfield code="a">1076286853</subfield><subfield code="a">1081277540</subfield><subfield code="a">1151242949</subfield><subfield code="a">1162247089</subfield><subfield code="a">1228560764</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266747</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266740</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836746</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836744</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611056094</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611056092</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080481000</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080481005</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52730213</subfield><subfield code="z">(OCoLC)56812754</subfield><subfield code="z">(OCoLC)57363231</subfield><subfield code="z">(OCoLC)70751981</subfield><subfield code="z">(OCoLC)162598926</subfield><subfield code="z">(OCoLC)181842474</subfield><subfield code="z">(OCoLC)475715849</subfield><subfield code="z">(OCoLC)559533483</subfield><subfield code="z">(OCoLC)646713809</subfield><subfield code="z">(OCoLC)722153984</subfield><subfield code="z">(OCoLC)728005745</subfield><subfield code="z">(OCoLC)729550825</subfield><subfield code="z">(OCoLC)733802710</subfield><subfield code="z">(OCoLC)748108681</subfield><subfield code="z">(OCoLC)759521878</subfield><subfield code="z">(OCoLC)888355536</subfield><subfield code="z">(OCoLC)961568537</subfield><subfield code="z">(OCoLC)961623463</subfield><subfield code="z">(OCoLC)962581879</subfield><subfield code="z">(OCoLC)962633538</subfield><subfield code="z">(OCoLC)966203083</subfield><subfield code="z">(OCoLC)988476987</subfield><subfield code="z">(OCoLC)991988652</subfield><subfield code="z">(OCoLC)992049570</subfield><subfield code="z">(OCoLC)1035714813</subfield><subfield code="z">(OCoLC)1037511712</subfield><subfield code="z">(OCoLC)1038678486</subfield><subfield code="z">(OCoLC)1045479264</subfield><subfield code="z">(OCoLC)1053046974</subfield><subfield code="z">(OCoLC)1055361351</subfield><subfield code="z">(OCoLC)1058175936</subfield><subfield code="z">(OCoLC)1076286853</subfield><subfield code="z">(OCoLC)1081277540</subfield><subfield code="z">(OCoLC)1151242949</subfield><subfield code="z">(OCoLC)1162247089</subfield><subfield code="z">(OCoLC)1228560764</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">100814:100827</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.B43 2003eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beale, Jay.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Snort 2.0 intrusion detection /</subfield><subfield code="c">Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2003.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxv, 523 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System Free CD Contains the Latest Version of Snort and Popular Plug-Ins Including ACID, Barnyard, and Swatch.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover Contents Intrusion Detection Systems Introducing Snort 2.0 Installing Snort Snort: The Inner Workings Playing by the Rules Preprocessors Implementing Snort Output Plug-Ins.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Snort (Software)</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010097375</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Snort (Software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intrusion detection systems (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2010008203</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes de détection d'intrusion (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intrusion detection systems (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Snort 2.0</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4749435-9</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foster, James C.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Posluns, Jeffrey.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Caswell, Brian.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Snort 2.0 intrusion detection (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGxD34B4Pd3x9BTDmbGbkC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Beale, Jay.</subfield><subfield code="t">Snort 2.0 intrusion detection.</subfield><subfield code="d">Rockland, MA : Syngress, ©2003</subfield><subfield code="z">1931836744</subfield><subfield code="w">(OCoLC)52274199</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85658</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85658</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836746</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836746</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL157386</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">85658</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">snort20intrusion00beal</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361882</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm52730213 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:15:57Z |
institution | BVB |
isbn | 1932266747 9781932266740 9781931836746 1931836744 9786611056094 6611056092 0080481000 9780080481005 |
language | English |
oclc_num | 52730213 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xxv, 523 pages :) |
psigel | ZDB-4-EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Syngress, |
record_format | marc |
spelling | Beale, Jay. Snort 2.0 intrusion detection / Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor. Rockland, MA : Syngress, ©2003. 1 online resource (xxv, 523 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Includes index. Print version record. The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System Free CD Contains the Latest Version of Snort and Popular Plug-Ins Including ACID, Barnyard, and Swatch. Cover Contents Intrusion Detection Systems Introducing Snort 2.0 Installing Snort Snort: The Inner Workings Playing by the Rules Preprocessors Implementing Snort Output Plug-Ins. English. Snort (Software) http://id.loc.gov/authorities/names/no2010097375 Snort (Software) fast Intrusion detection systems (Computer security) http://id.loc.gov/authorities/subjects/sh2010008203 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Systèmes de détection d'intrusion (Sécurité informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Intrusion detection systems (Computer security) fast Snort 2.0 gnd http://d-nb.info/gnd/4749435-9 Foster, James C. Posluns, Jeffrey. Caswell, Brian. has work: Snort 2.0 intrusion detection (Text) https://id.oclc.org/worldcat/entity/E39PCGxD34B4Pd3x9BTDmbGbkC https://id.oclc.org/worldcat/ontology/hasWork Print version: Beale, Jay. Snort 2.0 intrusion detection. Rockland, MA : Syngress, ©2003 1931836744 (OCoLC)52274199 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85658 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85658 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836746 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836746 Volltext |
spellingShingle | Beale, Jay Snort 2.0 intrusion detection / Cover Contents Intrusion Detection Systems Introducing Snort 2.0 Installing Snort Snort: The Inner Workings Playing by the Rules Preprocessors Implementing Snort Output Plug-Ins. Snort (Software) http://id.loc.gov/authorities/names/no2010097375 Snort (Software) fast Intrusion detection systems (Computer security) http://id.loc.gov/authorities/subjects/sh2010008203 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Systèmes de détection d'intrusion (Sécurité informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Intrusion detection systems (Computer security) fast Snort 2.0 gnd http://d-nb.info/gnd/4749435-9 |
subject_GND | http://id.loc.gov/authorities/names/no2010097375 http://id.loc.gov/authorities/subjects/sh2010008203 http://id.loc.gov/authorities/subjects/sh90001862 http://d-nb.info/gnd/4749435-9 |
title | Snort 2.0 intrusion detection / |
title_auth | Snort 2.0 intrusion detection / |
title_exact_search | Snort 2.0 intrusion detection / |
title_full | Snort 2.0 intrusion detection / Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor. |
title_fullStr | Snort 2.0 intrusion detection / Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor. |
title_full_unstemmed | Snort 2.0 intrusion detection / Jay Beale, James C. Foster ; Jeffrey Posluns, technical advisor ; Brian Caswell, technical editor. |
title_short | Snort 2.0 intrusion detection / |
title_sort | snort 2 0 intrusion detection |
topic | Snort (Software) http://id.loc.gov/authorities/names/no2010097375 Snort (Software) fast Intrusion detection systems (Computer security) http://id.loc.gov/authorities/subjects/sh2010008203 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Systèmes de détection d'intrusion (Sécurité informatique) Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Intrusion detection systems (Computer security) fast Snort 2.0 gnd http://d-nb.info/gnd/4749435-9 |
topic_facet | Snort (Software) Intrusion detection systems (Computer security) Computer security. Systèmes de détection d'intrusion (Sécurité informatique) Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Snort 2.0 |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85658 https://www.sciencedirect.com/science/book/9781931836746 |
work_keys_str_mv | AT bealejay snort20intrusiondetection AT fosterjamesc snort20intrusiondetection AT poslunsjeffrey snort20intrusiondetection AT caswellbrian snort20intrusiondetection |