REVIEW: "Managing Security with Snort and IDS Tools", Kerry Cox/Christopher Gerg

Discussion in 'Computer Security' started by Rob Slade, doting grandpa of Ryan and Trevor, Feb 9, 2005.

  1. BKMSWSIT.RVW 20041106

    "Managing Security with Snort and IDS Tools", Kerry Cox/Christopher
    Gerg, 2004, 0-596-00661-6, U$39.95/C$57.95
    %A Kerry Cox
    %A Christopher Gerg
    %C 103 Morris Street, Suite A, Sebastopol, CA 95472
    %D 2004
    %G 0-596-00661-6
    %I O'Reilly & Associates, Inc.
    %O U$39.95/C$57.95 800-998-9938 fax: 707-829-0104
    %O http://www.amazon.com/exec/obidos/ASIN/0596006616/robsladesinterne
    http://www.amazon.co.uk/exec/obidos/ASIN/0596006616/robsladesinte-21
    %O http://www.amazon.ca/exec/obidos/ASIN/0596006616/robsladesin03-20
    %O tl a rl 2 tc 3 ta 3 tv 2 wq 2
    %P 269 p.
    %T "Managing Security with Snort and IDS Tools"

    Chapter one explains what Snort, and network intrusion detection, is.
    The basics of network traffic sniffing and analysis, and the operation
    of tcpdump and ethereal, are described in chapter two. Installation,
    options, and the basic operation of Snort are outlined in chapter
    three. Chapter four details the different types of blackhat and
    intruder activity in terms of network intrusion. Chapter five details
    the confguration file and choices. How, and where, to use and set up
    Snort is the topic of chapter six. Snort rules are explained in
    chapter seven, which also outlines the system for creating them.
    Snort can also be used for intrusion prevention, as chapter eight
    points out. Tuning sensitivity, and establishing thresholds and
    clipping levels, is discussed in chapter nine. Chapter ten reviews
    the use of ACID (Analysis Console for Intrusion Detection) as a
    management console. An alternative program is SnortCenter, described
    in chapter eleven, and more options are listed in twelve. Chapter
    thirteen notes possibilities for the use of Snort in high bandwidth
    situations.

    For those interested in the standard intrusion detection program, here
    is a set of useful explanations for its use and operation.

    copyright Robert M. Slade, 2004 BKMSWSIT.RVW 20041106

    --
    ======================

    ============= for back issues:
    [Base URL] site http://victoria.tc.ca/techrev/
    or mirror http://sun.soci.niu.edu/~rslade/
    CISSP refs: [Base URL]mnbksccd.htm
    Security Dict.: [Base URL]secgloss.htm
    Book reviews: [Base URL]mnbk.htm
    Review mailing list: send mail to
    or
    Rob Slade, doting grandpa of Ryan and Trevor, Feb 9, 2005
    #1
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. John O.

    people like Christopher Mohr (Seamor)

    John O., Sep 1, 2003, in forum: Digital Photography
    Replies:
    0
    Views:
    329
    John O.
    Sep 1, 2003
  2. Brad

    Christopher Guest Collection

    Brad, Jan 10, 2004, in forum: DVD Video
    Replies:
    1
    Views:
    580
    Rich Clark
    Jan 10, 2004
  3. Colin Caulkins

    Christopher Guest Collection

    Colin Caulkins, Apr 25, 2004, in forum: DVD Video
    Replies:
    0
    Views:
    406
    Colin Caulkins
    Apr 25, 2004
  4. Michael Rogers

    RIP Christopher Reeve

    Michael Rogers, Oct 11, 2004, in forum: DVD Video
    Replies:
    6
    Views:
    555
    Michael Rogers
    Oct 11, 2004
  5. Rob Slade, doting grandpa of Ryan and Trevor

    REVIEW: "Better Ethics Now", Christopher Bauer

    Rob Slade, doting grandpa of Ryan and Trevor, Feb 25, 2008, in forum: Computer Security
    Replies:
    0
    Views:
    632
    Rob Slade, doting grandpa of Ryan and Trevor
    Feb 25, 2008
Loading...

Share This Page