Narrow your search

Library

KU Leuven (3)

UGent (3)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

Vlerick Business School (1)

VIVES (1)

VUB (1)


Resource type

book (3)


Language

English (3)


Year
From To Submit

2007 (1)

2004 (1)

2003 (1)

Listing 1 - 3 of 3
Sort by
Snort
Authors: --- ---
ISBN: 1281112593 9786611112592 0080549276 1597490997 9780080549279 9781597490993 9781281112590 6611112596 Year: 2007 Publisher: Burlington, MA Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features. The accompanying CD contains examples from real attacks allowing rea

Managing security with Snort and IDS tools.
Authors: ---
ISBN: 0596006616 Year: 2004 Publisher: Beijing O'Reilly

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

681.3*K65 --- Computer security. --- Computers --- Computer networks --- Computer security --- -Computer networks --- -005.8 --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Security and protection: authentication; insurance; invasive software (e.g. viruses, worms, Trojan horses); physical security; unauthorized access (e.g. hacking, phreaking) --- Access control. --- Security measures. --- Access control --- Security measures --- Distributed processing --- Snort (Computer file) --- Intrusion detection systems (Computer security) --- Intrusion detection systems (Computer security). --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- 005.8 --- IDSs (Intrusion detection systems) --- Snort (Software)

Listing 1 - 3 of 3
Sort by