Intrusion Detection with Snort POD/NR

Intrusion Detection with Snort

25%
OFF
International Edition
 
About the Book
Network security has become an important part of corporate IT strategy and safeguarding all the nooks and crannies of your network can be timely and expensive. This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Rehman provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data. The book contains custom scripts, real-life examples for SNORT, and to-the-point information about installing SNORT IDS so readers can build and run their sophisticated intrusion detection systems.SNORT is your network's packet sniffer that monitors network traffic in real time, scrutinizing each packet closely to detect a dangerous payload or suspicious anomalies.NSS Group, a European network security testing organization, tested SNORT along with intrusion detection system (IDS) products from 15 major vendors including Cisco, Computer Associates, and Symantec. According to NSS, SNORT, which was the sole Open Source freeware product tested, clearly outperformed the proprietary products.
About the Author:

RAFEEQ UR REHMAN is founding director of Argus Network Security Services, Inc. He is an HP Certified System Administrator and CCNA with more than nine years' experience in UNIX and network administration, as well as C and database programming. His books include The Linux Development Platform; Solaris 8 Training Guide (310-043): Network Administrator Certification; and HP Certified: HP-UX System Administration. He is a contributing writer for SysAdmin Journal and Linux Journal.

Book Details
ISBN-13: 9780131407336
Publisher: Prentice Hall
Publisher Imprint: PRENTICE HALL
Height: 236 mm
No of Pages: 288
Series Title: Bruce Perens' Open Source
Weight: 548 gr
ISBN-10: 0131407333
Publisher Date: 18 May 2003
Binding: Paperback
Language: English
Returnable: N
Spine Width: 21 mm
Width: 180 mm
User Reviews

Be the first to Write a Review on this book Intrusion Detection with Snort