Ebook453 pages8 hours
Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications
Rating: 0 out of 5 stars
()
About this ebook
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.
- Snort, Nessus, and Ethereal are the three most popular open source security tools in the world
- Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters
- Companion Web site provides all working code and scripts from the book for download
Read more from Brian Caswell
Snort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5Mike Rating: 4 out of 5 stars4/5A Cage of Butterflies Rating: 4 out of 5 stars4/5Only The Heart Rating: 3 out of 5 stars3/5View from Ararat Rating: 0 out of 5 stars0 ratingsDeucalion Rating: 3 out of 5 stars3/5Double Exposure Rating: 4 out of 5 stars4/5Loop Rating: 1 out of 5 stars1/5Lisdalia Rating: 4 out of 5 stars4/5Snort 2.1 Intrusion Detection, Second Edition Rating: 4 out of 5 stars4/5Asturias Rating: 3 out of 5 stars3/5
Related to Nessus, Snort, and Ethereal Power Tools
Related ebooks
AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Zero-Day Exploit: Countdown to Darkness Rating: 2 out of 5 stars2/5Hacking a Terror Network: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5Security Log Management: Identifying Patterns in the Chaos Rating: 3 out of 5 stars3/5Syngress Force Emerging Threat Analysis: From Mischief to Malicious Rating: 0 out of 5 stars0 ratingsInfoSec Career Hacking: Sell Your Skillz, Not Your Soul Rating: 3 out of 5 stars3/5Snort 2.1 Intrusion Detection, Second Edition Rating: 4 out of 5 stars4/5Cyber Adversary Characterization: Auditing the Hacker Mind Rating: 5 out of 5 stars5/5Practical VoIP Security Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5WarDriving and Wireless Penetration Testing Rating: 5 out of 5 stars5/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Snort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Google Talking Rating: 5 out of 5 stars5/5Network Security Assessment: From Vulnerability to Patch Rating: 0 out of 5 stars0 ratingsWireshark & Ethereal Network Protocol Analyzer Toolkit Rating: 0 out of 5 stars0 ratingsCyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5Hack Proofing Linux: A Guide to Open Source Security Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsRussian Cyber Activity Rating: 0 out of 5 stars0 ratingsSeven Deadliest Network Attacks Rating: 3 out of 5 stars3/5Mobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsPenetration Tester's Open Source Toolkit Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime Rating: 4 out of 5 stars4/5Network Security Traceback Attack and React in the United States Department of Defense Network Rating: 0 out of 5 stars0 ratingsHow to Defeat Advanced Malware: New Tools for Protection and Forensics Rating: 0 out of 5 stars0 ratingsClient-Side Attacks and Defense Rating: 0 out of 5 stars0 ratings
Computers For You
Standard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsElon Musk Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsSQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsMastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Learning the Chess Openings Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Alan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play Rating: 4 out of 5 stars4/5Storytelling with Data: Let's Practice! Rating: 4 out of 5 stars4/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5AP® Computer Science Principles Crash Course Rating: 0 out of 5 stars0 ratingsGarageBand Basics: The Complete Guide to GarageBand: Music Rating: 0 out of 5 stars0 ratingsDark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5
Reviews for Nessus, Snort, and Ethereal Power Tools
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Nessus, Snort, and Ethereal Power Tools - Brian Caswell
Enjoying the preview?
Page 1 of 1