Ebook453 pages8 hours
Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications
Rating: 0 out of 5 stars
()
About this ebook
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.
- Snort, Nessus, and Ethereal are the three most popular open source security tools in the world
- Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters
- Companion Web site provides all working code and scripts from the book for download
Read more from Brian Caswell
A Cage of Butterflies Rating: 4 out of 5 stars4/5Only The Heart Rating: 3 out of 5 stars3/5Deucalion Rating: 3 out of 5 stars3/5Loop Rating: 1 out of 5 stars1/5Double Exposure Rating: 4 out of 5 stars4/5Lisdalia Rating: 4 out of 5 stars4/5Mike Rating: 4 out of 5 stars4/5View from Ararat Rating: 0 out of 5 stars0 ratingsAsturias Rating: 3 out of 5 stars3/5Snort 2.1 Intrusion Detection, Second Edition Rating: 4 out of 5 stars4/5Snort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5
Related to Nessus, Snort, and Ethereal Power Tools
Related ebooks
AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Zero-Day Exploit: Countdown to Darkness Rating: 2 out of 5 stars2/5Hacking a Terror Network: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5Security Log Management: Identifying Patterns in the Chaos Rating: 3 out of 5 stars3/5Syngress Force Emerging Threat Analysis: From Mischief to Malicious Rating: 0 out of 5 stars0 ratingsInfoSec Career Hacking: Sell Your Skillz, Not Your Soul Rating: 3 out of 5 stars3/5Snort 2.1 Intrusion Detection, Second Edition Rating: 4 out of 5 stars4/5Cyber Adversary Characterization: Auditing the Hacker Mind Rating: 5 out of 5 stars5/5Practical VoIP Security Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5WarDriving and Wireless Penetration Testing Rating: 5 out of 5 stars5/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Snort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Google Talking Rating: 5 out of 5 stars5/5Network Security Assessment: From Vulnerability to Patch Rating: 0 out of 5 stars0 ratingsWireshark & Ethereal Network Protocol Analyzer Toolkit Rating: 0 out of 5 stars0 ratingsCyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5Hack Proofing Linux: A Guide to Open Source Security Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5Cracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsRussian Cyber Activity Rating: 0 out of 5 stars0 ratingsSeven Deadliest Network Attacks Rating: 3 out of 5 stars3/5Mobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsPenetration Tester's Open Source Toolkit Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime Rating: 4 out of 5 stars4/5Network Security Traceback Attack and React in the United States Department of Defense Network Rating: 0 out of 5 stars0 ratingsHow to Defeat Advanced Malware: New Tools for Protection and Forensics Rating: 0 out of 5 stars0 ratings
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5CompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsAP Computer Science Principles Premium, 2024: 6 Practice Tests + Comprehensive Review + Online Practice Rating: 0 out of 5 stars0 ratingsCreating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsSQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Childhood Unplugged: Practical Advice to Get Kids Off Screens and Find Balance Rating: 0 out of 5 stars0 ratingsElon Musk Rating: 4 out of 5 stars4/5Going Text: Mastering the Command Line Rating: 4 out of 5 stars4/5The Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5
Reviews for Nessus, Snort, and Ethereal Power Tools
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Nessus, Snort, and Ethereal Power Tools - Brian Caswell
Enjoying the preview?
Page 1 of 1