Nessus, Snort, & Ethereal power tools :: customizing open source security applications /
Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scri...
Gespeichert in:
1. Verfasser: | |
---|---|
Körperschaft: | |
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA : [Sebastopol, Calif.] :
Syngress ; Distributed by O'Reilly Media,
©2005.
|
Schriftenreihe: | Jay Beale's open source security series.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts. |
Beschreibung: | 1 online resource (xxvi, 445 pages) : illustrations |
ISBN: | 1423754220 9781423754220 0080489427 9780080489421 9781597490207 1597490202 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm64185769 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 060221s2005 maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d OCLCG |d OCLCQ |d TUU |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d NLGGC |d OCLCQ |d N15 |d E7B |d YDXCP |d IDEBK |d NTG |d WPG |d UMI |d CEF |d DKDLA |d NHM |d B24X7 |d DEBSZ |d MERUC |d OPELS |d FVL |d OCLCQ |d COO |d OCLCQ |d AZK |d CNNLC |d LOA |d AGLDB |d COCUF |d CNNOR |d CCO |d MOR |d PIFBR |d LIV |d OCLCQ |d WY@ |d U3W |d LUE |d STF |d WRM |d D6H |d VTS |d NRAMU |d EZ9 |d MOQ |d INT |d VT2 |d OCLCQ |d G3B |d TKN |d OCLCQ |d UAB |d LEAUB |d M8D |d OCLCO |d INARC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 62411699 |a 84146079 |a 162597293 |a 181421113 |a 319430068 |a 473076534 |a 475321955 |a 593862197 |a 606029663 |a 647464635 |a 722429393 |a 728037585 |a 856957571 |a 888433318 |a 961507724 |a 962707029 |a 991918849 |a 1044291885 | ||
020 | |a 1423754220 |q (electronic bk.) | ||
020 | |a 9781423754220 |q (electronic bk.) | ||
020 | |a 0080489427 | ||
020 | |a 9780080489421 | ||
020 | |a 9781597490207 | ||
020 | |a 1597490202 | ||
035 | |a (OCoLC)64185769 |z (OCoLC)62411699 |z (OCoLC)84146079 |z (OCoLC)162597293 |z (OCoLC)181421113 |z (OCoLC)319430068 |z (OCoLC)473076534 |z (OCoLC)475321955 |z (OCoLC)593862197 |z (OCoLC)606029663 |z (OCoLC)647464635 |z (OCoLC)722429393 |z (OCoLC)728037585 |z (OCoLC)856957571 |z (OCoLC)888433318 |z (OCoLC)961507724 |z (OCoLC)962707029 |z (OCoLC)991918849 |z (OCoLC)1044291885 | ||
037 | |a CL0500000038 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 |b .A734 2005eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Archibald, Neil. | |
245 | 1 | 0 | |a Nessus, Snort, & Ethereal power tools : |b customizing open source security applications / |c Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. |
246 | 3 | |a Nessus, Snort, and Ethereal power tools | |
246 | 3 | 0 | |a Customizing open source security applications |
260 | |a Rockland, MA : |b Syngress ; |a [Sebastopol, Calif.] : |b Distributed by O'Reilly Media, |c ©2005. | ||
300 | |a 1 online resource (xxvi, 445 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Jay Beale's open source security series | |
588 | 0 | |a Print version record. | |
505 | 0 | |a pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain. | |
520 | |a Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Open source software. |0 http://id.loc.gov/authorities/subjects/sh99003437 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels libres. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 blmlsh | |
650 | 7 | |a Open source software. |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Open source software |2 fast | |
700 | 1 | |a Ramirez, Gilbert, |d 1972- |1 https://id.oclc.org/worldcat/entity/E39PCjHMVQDfhhXyxjx7kwk4Md |0 http://id.loc.gov/authorities/names/no2005117741 | |
700 | 1 | |a Rathaus, Noam. | |
710 | 2 | |a Syngress Media, Inc. |0 http://id.loc.gov/authorities/names/n98062058 | |
776 | 0 | 8 | |i Print version: |a Archibald, Neil. |t Nessus, Snort, & Ethereal power tools. |d Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, ©2005 |z 1597490202 |w (OCoLC)62293608 |
830 | 0 | |a Jay Beale's open source security series. |0 http://id.loc.gov/authorities/names/no2004036853 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149577 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490207 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00004926 | ||
938 | |a ebrary |b EBRY |n ebr10110275 | ||
938 | |a EBSCOhost |b EBSC |n 149577 | ||
938 | |a Internet Archive |b INAR |n nessussnortether0000arch | ||
938 | |a YBP Library Services |b YANK |n 2730624 | ||
938 | |a YBP Library Services |b YANK |n 2395146 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm64185769 |
---|---|
_version_ | 1816881633895120896 |
adam_text | |
any_adam_object | |
author | Archibald, Neil |
author2 | Ramirez, Gilbert, 1972- Rathaus, Noam |
author2_role | |
author2_variant | g r gr n r nr |
author_GND | http://id.loc.gov/authorities/names/no2005117741 |
author_corporate | Syngress Media, Inc |
author_corporate_role | |
author_facet | Archibald, Neil Ramirez, Gilbert, 1972- Rathaus, Noam Syngress Media, Inc |
author_role | |
author_sort | Archibald, Neil |
author_variant | n a na |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .A734 2005eb |
callnumber-search | TK5105.59 .A734 2005eb |
callnumber-sort | TK 45105.59 A734 42005EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain. |
ctrlnum | (OCoLC)64185769 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05213cam a2200757 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm64185769 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">060221s2005 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N15</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">NTG</subfield><subfield code="d">WPG</subfield><subfield code="d">UMI</subfield><subfield code="d">CEF</subfield><subfield code="d">DKDLA</subfield><subfield code="d">NHM</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OPELS</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">CNNLC</subfield><subfield code="d">LOA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">CCO</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">EZ9</subfield><subfield code="d">MOQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UAB</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">62411699</subfield><subfield code="a">84146079</subfield><subfield code="a">162597293</subfield><subfield code="a">181421113</subfield><subfield code="a">319430068</subfield><subfield code="a">473076534</subfield><subfield code="a">475321955</subfield><subfield code="a">593862197</subfield><subfield code="a">606029663</subfield><subfield code="a">647464635</subfield><subfield code="a">722429393</subfield><subfield code="a">728037585</subfield><subfield code="a">856957571</subfield><subfield code="a">888433318</subfield><subfield code="a">961507724</subfield><subfield code="a">962707029</subfield><subfield code="a">991918849</subfield><subfield code="a">1044291885</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754220</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754220</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489427</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489421</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490207</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490202</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64185769</subfield><subfield code="z">(OCoLC)62411699</subfield><subfield code="z">(OCoLC)84146079</subfield><subfield code="z">(OCoLC)162597293</subfield><subfield code="z">(OCoLC)181421113</subfield><subfield code="z">(OCoLC)319430068</subfield><subfield code="z">(OCoLC)473076534</subfield><subfield code="z">(OCoLC)475321955</subfield><subfield code="z">(OCoLC)593862197</subfield><subfield code="z">(OCoLC)606029663</subfield><subfield code="z">(OCoLC)647464635</subfield><subfield code="z">(OCoLC)722429393</subfield><subfield code="z">(OCoLC)728037585</subfield><subfield code="z">(OCoLC)856957571</subfield><subfield code="z">(OCoLC)888433318</subfield><subfield code="z">(OCoLC)961507724</subfield><subfield code="z">(OCoLC)962707029</subfield><subfield code="z">(OCoLC)991918849</subfield><subfield code="z">(OCoLC)1044291885</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000038</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.A734 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Archibald, Neil.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nessus, Snort, & Ethereal power tools :</subfield><subfield code="b">customizing open source security applications /</subfield><subfield code="c">Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Nessus, Snort, and Ethereal power tools</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Customizing open source security applications</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress ;</subfield><subfield code="a">[Sebastopol, Calif.] :</subfield><subfield code="b">Distributed by O'Reilly Media,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvi, 445 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Jay Beale's open source security series</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh99003437</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels libres.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramirez, Gilbert,</subfield><subfield code="d">1972-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjHMVQDfhhXyxjx7kwk4Md</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2005117741</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rathaus, Noam.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Syngress Media, Inc.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98062058</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Archibald, Neil.</subfield><subfield code="t">Nessus, Snort, & Ethereal power tools.</subfield><subfield code="d">Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, ©2005</subfield><subfield code="z">1597490202</subfield><subfield code="w">(OCoLC)62293608</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Jay Beale's open source security series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004036853</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149577</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490207</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00004926</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10110275</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">149577</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">nessussnortether0000arch</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730624</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2395146</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm64185769 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:50Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n98062058 |
isbn | 1423754220 9781423754220 0080489427 9780080489421 9781597490207 1597490202 |
language | English |
oclc_num | 64185769 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxvi, 445 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress ; Distributed by O'Reilly Media, |
record_format | marc |
series | Jay Beale's open source security series. |
series2 | Jay Beale's open source security series |
spelling | Archibald, Neil. Nessus, Snort, & Ethereal power tools : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. Nessus, Snort, and Ethereal power tools Customizing open source security applications Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, ©2005. 1 online resource (xxvi, 445 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Jay Beale's open source security series Print version record. pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain. Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Réseaux d'ordinateurs Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures. blmlsh Open source software. blmlsh Computer networks Security measures fast Open source software fast Ramirez, Gilbert, 1972- https://id.oclc.org/worldcat/entity/E39PCjHMVQDfhhXyxjx7kwk4Md http://id.loc.gov/authorities/names/no2005117741 Rathaus, Noam. Syngress Media, Inc. http://id.loc.gov/authorities/names/n98062058 Print version: Archibald, Neil. Nessus, Snort, & Ethereal power tools. Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, ©2005 1597490202 (OCoLC)62293608 Jay Beale's open source security series. http://id.loc.gov/authorities/names/no2004036853 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149577 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490207 Volltext |
spellingShingle | Archibald, Neil Nessus, Snort, & Ethereal power tools : customizing open source security applications / Jay Beale's open source security series. pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Réseaux d'ordinateurs Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures. blmlsh Open source software. blmlsh Computer networks Security measures fast Open source software fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh99003437 |
title | Nessus, Snort, & Ethereal power tools : customizing open source security applications / |
title_alt | Nessus, Snort, and Ethereal power tools Customizing open source security applications |
title_auth | Nessus, Snort, & Ethereal power tools : customizing open source security applications / |
title_exact_search | Nessus, Snort, & Ethereal power tools : customizing open source security applications / |
title_full | Nessus, Snort, & Ethereal power tools : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. |
title_fullStr | Nessus, Snort, & Ethereal power tools : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. |
title_full_unstemmed | Nessus, Snort, & Ethereal power tools : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison. |
title_short | Nessus, Snort, & Ethereal power tools : |
title_sort | nessus snort ethereal power tools customizing open source security applications |
title_sub | customizing open source security applications / |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Réseaux d'ordinateurs Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures. blmlsh Open source software. blmlsh Computer networks Security measures fast Open source software fast |
topic_facet | Computer networks Security measures. Open source software. Réseaux d'ordinateurs Sécurité Mesures. Logiciels libres. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Open source software |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149577 https://www.sciencedirect.com/science/book/9781597490207 |
work_keys_str_mv | AT archibaldneil nessussnortetherealpowertoolscustomizingopensourcesecurityapplications AT ramirezgilbert nessussnortetherealpowertoolscustomizingopensourcesecurityapplications AT rathausnoam nessussnortetherealpowertoolscustomizingopensourcesecurityapplications AT syngressmediainc nessussnortetherealpowertoolscustomizingopensourcesecurityapplications AT archibaldneil nessussnortandetherealpowertools AT ramirezgilbert nessussnortandetherealpowertools AT rathausnoam nessussnortandetherealpowertools AT syngressmediainc nessussnortandetherealpowertools AT archibaldneil customizingopensourcesecurityapplications AT ramirezgilbert customizingopensourcesecurityapplications AT rathausnoam customizingopensourcesecurityapplications AT syngressmediainc customizingopensourcesecurityapplications |