Nessus, Snort, & Ethereal power tools: customizing open source security applications
Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scri...
Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Rockland, MA [Sebastopol, Calif.]
Syngress ;
2005
Rockland, MA [Sebastopol, Calif.] Distributed by O'Reilly Media 2005 |
Series: | Jay Beale's open source security series
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781597490207/?ar |
Summary: | Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts. |
Item Description: | Print version record |
Physical Description: | 1 Online-Ressource (xxvi, 445 Seiten) illustrations |
ISBN: | 1423754220 9781423754220 0080489427 9780080489421 9781597490207 1597490202 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047646934 | ||
003 | DE-627-1 | ||
005 | 20240228114002.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2005 xx |||||o 00| ||eng c | ||
020 | |a 1423754220 |c electronic bk. |9 1-4237-5422-0 | ||
020 | |a 9781423754220 |c electronic bk. |9 978-1-4237-5422-0 | ||
020 | |a 0080489427 |9 0-08-048942-7 | ||
020 | |a 9780080489421 |9 978-0-08-048942-1 | ||
020 | |a 9781597490207 |9 978-1-59749-020-7 | ||
020 | |a 1597490202 |9 1-59749-020-2 | ||
035 | |a (DE-627-1)047646934 | ||
035 | |a (DE-599)KEP047646934 | ||
035 | |a (ORHE)9781597490207 | ||
035 | |a (DE-627-1)047646934 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Archibald, Neil |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Nessus, Snort, & Ethereal power tools |b customizing open source security applications |c Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison |
246 | 3 | 3 | |a Customizing open source security applications |
264 | 1 | |a Rockland, MA |a [Sebastopol, Calif.] |b Syngress ; |c 2005 | |
264 | 1 | |a Rockland, MA |a [Sebastopol, Calif.] |b Distributed by O'Reilly Media |c 2005 | |
300 | |a 1 Online-Ressource (xxvi, 445 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Jay Beale's open source security series | |
500 | |a Print version record | ||
520 | |a Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Open source software | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Logiciels libres | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Open source software | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Open source software | |
700 | 1 | |a Ramirez, Gilbert |d 1972- |e MitwirkendeR |4 ctb | |
700 | 1 | |a Rathaus, Noam |e MitwirkendeR |4 ctb | |
710 | 2 | |a Syngress Media, Inc. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1597490202 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597490202 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597490207/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047646934 |
---|---|
_version_ | 1829007776918011904 |
adam_text | |
any_adam_object | |
author | Archibald, Neil |
author2 | Ramirez, Gilbert 1972- Rathaus, Noam |
author2_role | ctb ctb |
author2_variant | g r gr n r nr |
author_corporate | Syngress Media, Inc |
author_corporate_role | ctb |
author_facet | Archibald, Neil Ramirez, Gilbert 1972- Rathaus, Noam Syngress Media, Inc |
author_role | aut |
author_sort | Archibald, Neil |
author_variant | n a na |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047646934 (DE-599)KEP047646934 (ORHE)9781597490207 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02855cam a22006612c 4500</leader><controlfield tag="001">ZDB-30-ORH-047646934</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114002.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2005 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754220</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-5422-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754220</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-5422-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489427</subfield><subfield code="9">0-08-048942-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489421</subfield><subfield code="9">978-0-08-048942-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490207</subfield><subfield code="9">978-1-59749-020-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490202</subfield><subfield code="9">1-59749-020-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047646934</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047646934</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597490207</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047646934</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Archibald, Neil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nessus, Snort, & Ethereal power tools</subfield><subfield code="b">customizing open source security applications</subfield><subfield code="c">Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Customizing open source security applications</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="a">[Sebastopol, Calif.]</subfield><subfield code="b">Syngress ;</subfield><subfield code="c">2005</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="a">[Sebastopol, Calif.]</subfield><subfield code="b">Distributed by O'Reilly Media</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 445 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Jay Beale's open source security series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels libres</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ramirez, Gilbert</subfield><subfield code="d">1972-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rathaus, Noam</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Syngress Media, Inc.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597490202</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490202</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597490207/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047646934 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:41Z |
institution | BVB |
isbn | 1423754220 9781423754220 0080489427 9780080489421 9781597490207 1597490202 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxvi, 445 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress ; Distributed by O'Reilly Media |
record_format | marc |
series2 | Jay Beale's open source security series |
spelling | Archibald, Neil VerfasserIn aut Nessus, Snort, & Ethereal power tools customizing open source security applications Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison Customizing open source security applications Rockland, MA [Sebastopol, Calif.] Syngress ; 2005 Rockland, MA [Sebastopol, Calif.] Distributed by O'Reilly Media 2005 1 Online-Ressource (xxvi, 445 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Jay Beale's open source security series Print version record Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts. Computer networks Security measures Open source software Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels libres COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures Ramirez, Gilbert 1972- MitwirkendeR ctb Rathaus, Noam MitwirkendeR ctb Syngress Media, Inc. MitwirkendeR ctb 1597490202 Erscheint auch als Druck-Ausgabe 1597490202 |
spellingShingle | Archibald, Neil Nessus, Snort, & Ethereal power tools customizing open source security applications Computer networks Security measures Open source software Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels libres COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Nessus, Snort, & Ethereal power tools customizing open source security applications |
title_alt | Customizing open source security applications |
title_auth | Nessus, Snort, & Ethereal power tools customizing open source security applications |
title_exact_search | Nessus, Snort, & Ethereal power tools customizing open source security applications |
title_full | Nessus, Snort, & Ethereal power tools customizing open source security applications Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison |
title_fullStr | Nessus, Snort, & Ethereal power tools customizing open source security applications Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison |
title_full_unstemmed | Nessus, Snort, & Ethereal power tools customizing open source security applications Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison |
title_short | Nessus, Snort, & Ethereal power tools |
title_sort | nessus snort ethereal power tools customizing open source security applications |
title_sub | customizing open source security applications |
topic | Computer networks Security measures Open source software Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels libres COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer networks Security measures Open source software Réseaux d'ordinateurs ; Sécurité ; Mesures Logiciels libres COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT archibaldneil nessussnortetherealpowertoolscustomizingopensourcesecurityapplications AT ramirezgilbert nessussnortetherealpowertoolscustomizingopensourcesecurityapplications AT rathausnoam nessussnortetherealpowertoolscustomizingopensourcesecurityapplications AT syngressmediainc nessussnortetherealpowertoolscustomizingopensourcesecurityapplications AT archibaldneil customizingopensourcesecurityapplications AT ramirezgilbert customizingopensourcesecurityapplications AT rathausnoam customizingopensourcesecurityapplications AT syngressmediainc customizingopensourcesecurityapplications |