Amazon cover image
Image from Amazon.com

Nessus, Snort, & Ethereal power tools : customizing open source security applications / Neil Archibald, Gilbert Ramirez, Noam Rathaus ; technical editor[s], Josh Burke, Brian Caswell, Renaud Deraison.

By: Contributor(s): Material type: TextTextSeries: Jay Beale's open source security seriesPublication details: Rockland, MA : Syngress ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, ©2005.Description: 1 online resource (xxvi, 445 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1423754220
  • 9781423754220
  • 0080489427
  • 9780080489421
  • 9781597490207
  • 1597490202
Other title:
  • Nessus, Snort, and Ethereal power tools
  • Customizing open source security applications
Subject(s): Genre/Form: Additional physical formats: Print version:: Nessus, Snort, & Ethereal power tools.DDC classification:
  • 005.8 22
LOC classification:
  • TK5105.59 .A734 2005eb
Online resources:
Contents:
pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain.
Summary: Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Print version record.

pt. I. Nessus tools -- Ch. 1. The inner workings of NASL (Nessus attack scripting language) -- Ch. 2. Debugging NASLs -- Ch. 3. Extensions and custom tests -- Ch. 4. Understanding the extended capabilities of the Nessus environment -- Ch. 5. Analyzing GetFileVersion and MySQL passwordless test -- Ch. 6. Automating the creation of NASLs -- pt. II. Snort tools -- Ch. 7. The inner workings of Snort -- Ch. 8. Snort rules -- Ch. 9. Plugins and preprocessors -- Ch. 10. Modifying Snort -- pt. III. Ethereal tools -- Ch. 11. Capture file formats -- Ch. 12. Protocol dissectors -- Ch. 13. Reporting from Ethereal -- App. A. Host integrity monitoring using Osiris and Samhain.

Covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for unusual traffic. This book describes the important concepts of coding and customizing tools, and provides readers with working scripts.

Master record variable field(s) change: 082

Powered by Koha