• book
    0% of Nessus, Snort, and Ethereal Power Tools completed

From the Publisher

This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to “sniff their network for malicious or unusual traffic. The book will also contain an appendix detailing “the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.

* Snort, Nessus, and Ethereal are the three most popular open source security tools in the world
* Only book that teaches readers how to customize these tools for their specific needs by coding rules,
plugins, and filters
* Companion Web site provides all working code and scripts from the book for download
Published: Elsevier Science an imprint of Elsevier Books Reference on
ISBN: 9780080489421
List price: $43.95
Read on Scribd mobile: iPhone, iPad and Android.
Availability for Nessus, Snort, and Ethereal Power Tools: Customizing Open...
With a 30 day free trial you can read online for free
  1. This book can be read on up to 6 mobile devices.

Related Articles

Entrepreneur
8 min read
Tech

How to Protect Your Small Business Against a Cyber Attack

The Seattle hacker drove a black Mercedes. He owned a Rolex. He liked to frequent a downtown wine bar. While it's easy to think of cyber criminals as faceless, digital pickpockets in far-flung countries, the reality is that they are among us. In one notorious case, a bandit and his gang of cyber crooks compromised at least 53 Seattle-area small and medium-size businesses between 2008 and 2010, stealing enough data to cause $3 million in damages to the companies, their employees and their customers. "This wasn't the type of crime that we anticipated," tech-company employee Alec Fishburne said a
Popular Science
6 min read

How To Remove Malware From Your Computer

If you've been hit by malware, don't panic—all is not lost Alejandro Escamilla/Unsplash/Pixabay Disaster has struck—an unwanted piece of malware took root on your computer. So what's your next step? While the potential damage viruses can cause shouldn't be underestimated, you might be able to get your computer back on its feet without too much difficulty, thanks to an array of helpful tools at your disposal. We're using the term malware to refer to all kinds of computer nasties, from viruses to ransomware to adware. While each of these threats have their own definitions, the terms are often us
Popular Science
1 min read

Stop Hackers in Their Tracks With This Expert Training

Stack Commerce Stop hackers in their tracks with this expert training In 2016, hacked security cameras and PVRs took down the web in the US. One major international bank lost $81 million to cyber criminals. In this climate, skilled hero hackers get paid handsomely to help companies find their weaknesses and stop malicious hackers in their tracks. The Ethical Hacking A to Z Bundle helps you build a lucrative security career with 45 hours of premium instruction, now just $39 at the Popular Science Shop. While some hacking groups aim to disrupt large corporations, others do real damage to startup