Snort Intrusion Detection and Prevention Toolkit (Paperback)
暫譯: Snort 入侵偵測與防護工具包 (平裝本)
Brian Caswell, Jay Beale, Andrew Baker
- 出版商: Syngress Media
- 出版日期: 2007-03-01
- 售價: $2,270
- 貴賓價: 9.5 折 $2,157
- 語言: 英文
- 頁數: 768
- 裝訂: Paperback
- ISBN: 1597490997
- ISBN-13: 9781597490993
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$660$627 -
$980$931 -
$1,539The Elements of Statistical Learning: Data Mining, Inference, and Prediction
-
$1,780$1,691 -
$760$646 -
$4,620$4,389 -
$890$703 -
$3,370$3,202 -
$480$432 -
$300$270 -
$650$507 -
$550$435 -
$980$774 -
$490$387 -
$2,610$2,480 -
$880$695 -
$290$226 -
$600$480 -
$300$270 -
$420$357 -
$2,240$2,128 -
$360$284 -
$534$507 -
$403請君入甕 — APT 攻防指南之兵不厭詐
-
$580$493
商品描述
This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features.
The accompanying CD contains examples from real attacks allowing readers test their new skills. The book will begin with a discussion of packet inspection and the progression from intrusion detection to intrusion prevention. The authors provide examples of packet inspection methods including: protocol standards compliance, protocol anomaly detection, application control, and signature matching. In addition, application-level vulnerabilities including Binary Code in HTTP headers, HTTP/HTTPS Tunneling, URL Directory Traversal, Cross-Site Scripting, and SQL Injection will also be analyzed. Next, a brief chapter on installing and configuring Snort will highlight various methods for fine tuning your installation to optimize Snort performance including hardware/OS selection, finding and eliminating bottlenecks, and benchmarking and testing your deployment. A special chapter also details how to use Barnyard to improve the overall performance of Snort. Next, best practices will be presented allowing readers to enhance the performance of Snort for even the largest and most complex networks. The next chapter reveals the inner workings of Snort by analyzing the source code. The next several chapters will detail how to write, modify, and fine-tune basic to advanced rules and pre-processors. Detailed analysis of real packet captures will be provided both in the book and the accompanying CD. Several examples for optimizing output plugins will then be discussed including a comparison of MySQL and PostrgreSQL. Best practices for monitoring Snort sensors and analyzing intrusion data follow with examples of real world attacks using: ACID, BASE, SGUIL, SnortSnarf, Snort_stat.pl, Swatch, and more.
The last part of the book contains several chapters on active response, intrusion prevention, and using Snort's most advanced capabilities for everything from forensics and incident handling to building and analyzing honey pots. Data from real world attacks will be presented throughout this part as well as on the accompanying CD.
* This fully integrated book, CD, and Web toolkit covers everything all in one convenient package
* It is authored by members of the Snort team and it is packed full of their experience and expertise
* Includes full coverage of the brand new Snort version 2.6, packed full of all the latest information
商品描述(中文翻譯)
這本全新的書籍涵蓋了 Snort 2.6 的最新版本,由 Snort 開發團隊的成員撰寫。
這本完全整合的書籍、CD 和網路工具包涵蓋了從封包檢查到優化 Snort 速度,再到使用 Snort 最先進功能來防禦即使是最大的、最擁擠的企業網路的所有內容。領先的 Snort 專家 Brian Caswell、Andrew Baker 和 Jay Beale 分析了來自真實攻擊的流量,以展示實施最強大 Snort 功能的最佳實踐。
隨附的 CD 包含來自真實攻擊的範例,讓讀者可以測試他們的新技能。書籍將以封包檢查的討論開始,並探討從入侵檢測到入侵防禦的進展。作者提供了封包檢查方法的範例,包括:協議標準遵循、協議異常檢測、應用控制和簽名匹配。此外,還將分析應用層漏洞,包括 HTTP 標頭中的二進位碼、HTTP/HTTPS 隧道、URL 目錄遍歷、跨站腳本攻擊和 SQL 注入。接下來,一個簡短的章節將介紹安裝和配置 Snort,重點介紹各種微調安裝以優化 Snort 性能的方法,包括硬體/作業系統選擇、尋找和消除瓶頸,以及基準測試和測試您的部署。一個特別的章節還詳細說明了如何使用 Barnyard 來改善 Snort 的整體性能。接下來,將介紹最佳實踐,讓讀者能夠提升 Snort 在即使是最大的和最複雜的網路中的性能。下一章將通過分析源代碼揭示 Snort 的內部運作。接下來的幾個章節將詳細說明如何編寫、修改和微調從基本到進階的規則和前處理器。書中和隨附的 CD 將提供真實封包捕獲的詳細分析。然後將討論幾個優化輸出插件的範例,包括 MySQL 和 PostgreSQL 的比較。接下來是監控 Snort 感測器和分析入侵數據的最佳實踐,並提供使用 ACID、BASE、SGUIL、SnortSnarf、Snort_stat.pl、Swatch 等的真實攻擊範例。
書籍的最後部分包含幾個章節,討論主動響應、入侵防禦,以及使用 Snort 最先進的功能來處理從取證和事件處理到建立和分析蜜罐的所有內容。這部分將展示來自真實攻擊的數據,並在隨附的 CD 上提供。
* 這本完全整合的書籍、CD 和網路工具包涵蓋了所有內容,方便攜帶
* 由 Snort 團隊成員撰寫,充滿他們的經驗和專業知識
* 包含全新 Snort 2.6 的完整內容,提供所有最新資訊