Nessus, Snort & Ethereal power tools : Customizing open source security applications
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 1597490202
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
Biblioteca Fac.Informática | C.2.0 ARC (Browse shelf(Opens below)) | Available | DIF-02732 |
Browsing Biblioteca Fac.Informática shelves Close shelf browser (Hides shelf browser)
C.2 TAN Computer networks | C.2 TAN Computer networks | C.2 TAN depo Redes de ordenadores | C.2.0 ARC Nessus, Snort & Ethereal power tools : Customizing open source security applications | C.2.0 BAK Network segurity : how to plan for it and archive it | C.2.0 BAK Snort 2.1 intrusion detection | C.2.0 BOT Botnets : The killer Web App |
Incluye índice. --
I. Nessus tools: The inner workings of NASL (Nessus Attack Scripting Language) -- Debugging NASLs -- Extensions and custom tests -- Understanding the extended capabilities of the Nessus environment -- Analyzing GetFileVersion and MySQL passwordless test -- Automating the creation of NASLs -- II. Snort tools: The inner workings of Snort -- Snort rules -- Plugins and preprocessors -- Modifying Snort -- III. Ethereal tools: Capture file formats -- Protocol dissectors -- Reporting from Ethereal -- App. A. A host integrity monitoring using Osiris and Samhain.
There are no comments on this title.