home > paid book/ebook

Managing Security with Snort and IDS Tools

Customer Reviews:

One of the better discourses on Snort

By Harold McFarland - December 27, 2004

This is basically a book about intrusion detection using all open source tools. It starts with an introductory chapter that explains the problem of defining an intrusion and why it is becoming more and more of a problem. It follows up with a chapter on network traffic analysis including packet sniffing and using tcpdump and ethereal. Then comes the meat of the text - installing Snort. Of course to really understand how to use Snort you have to understand how attacks occur and the common methods used. The authors provide a really nice chapter on this subject. After that come five chapters on configuring, deploying, and managing Snort rules, intrusion prevention strategies, and tuning. Once Snort is up and running the authors examine the use of ACID and SnortCenter as Snort IDS management consoles. Either of these products drastically decreases the burden of analyzing what has happened and is happening on the intrusion detection forefront. The book ends with additional tools... read more

Excellent description of Snort

By Eric Wuehler - October 9, 2004

Up to this point, I've only use simple firewalls for my home network. Not that I think there's anything really worth hacking on my home network, but I thought I'd spend a little time learning about intrusion detection. This book is great for several reasons. First, it is well put together and easy to follow. Second, it describes in detail the open source project Snort. Finally, it satisfied my curiosity about IDS (Intrusion detection systems) - I'm not an expert, but I now understand the concepts.

Even though the book did not mention OS X specifically, it was easy to get snort compiled and installed on my Mac. There were a few tweaks I had to do, but if you're familiar with "configure; make; make install", it should be a snap. (Likewise, fink or darwinports can get you going with Snort as well). Any other flavor of Unix/Linux would be that much easier to install.

Beyond just describing how to install and configure Snort, the book does go into some detail... read more

Snort made easy!

By Sean E. Connelly "Just a bithead - CCIE#17085" - March 9, 2006

O'Reilly's "Managing Security with Snort and IDS Tools" by Cox and Greg is a practical book that succinctly describes the basic functionality and utility of implanting Snort. The book does an excellent job at discussing the different configuration parameters when deploying Snort.

In particular, I was impressed by:

* Page 35 - A 5-page list detailing the different options available via the command-line.

* Page 69 - Details some of the techniques used to evade IDSs.

* Chapter 5's description of preprocessor configurations was a valuable tool to a newbie of UNIX.

* Chapter 10 description of ACID as a Snort IDS Management Console.

The only area I wish the authors expanded on was in Chapter 7 "Creating Your Own Rules". This area can easily be supplemented from documentation on the web.

The book has a natural bias toward elevating open source tools (I am fan of open source tools). Appreciating that fact, I must... read more

Use coupon below to get discount at eCampus.com!

SHADES
$3 off textbook orders over $75

SUNBLOCK
$4 off textbook orders over $90

SUNSHINE
$5 off textbook orders over $100

Copy the coupon code before clicking the button!

AVAILABILITY
MerchantFormatPrice
Amazon USPaperback$1.21 - $39.95
eBooks.comDigital (PDF)$31.99
eCampusPaperback$38.39 discount!
PREVIEW
Related Documents
How to Do Everything with PHP and MySQL

How to Do Everything with PHP and MySQL

$4.19 - $37.12

This new release in the popular How to Do Everything series explains how to build open source web applications with MySQL and PHP 5. Using these two tools, you’ll be able to create ...

Managing Projects with GNU Make (Nutshell Handbooks)

Managing Projects with GNU Make (Nutshell Handbooks)

$9.00 - $39.99

The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the ...

Scaling Lean & Agile Development: Thinking and Organizational Tools for Large-Scale Scrum

Scaling Lean & Agile Development: Thinking and Organizational Tools for Large-Scale Scrum

$17.88 - $59.99

Lean Development and Agile Methods for Large-Scale Products: Key Thinking and Organizational Tools for Sustainable Competitive Success

Executive Coaching with Backbone and Heart: A Systems Approach to Engaging Leaders with Their Challenges

Executive Coaching with Backbone and Heart: A Systems Approach to Engaging Leaders with Their Challenges…

$25.12 - $53.00

Praise for Executive Coaching with Backbone and Heart"In this book, O'Neill brings form and structure to the art of executive coaching. Novices are provided a path while seasoned ...

Preparation of Compounds Labeled with Tritium and Carbon-14

Preparation of Compounds Labeled with Tritium and Carbon-14

$161.00 - $228.79

Compounds labeled with carbon-14 and tritium are indispensable tools for research in biomedical sciences, discovery and development of pharmaceuticals and agrochemicals.Preparation of Compounds ...

Designing with FPGAs and CPLDs

Designing with FPGAs and CPLDs

$17.97 - $62.95

* Choose the right programmable logic devices and development tools * Understand the design, verification, and testing issues * Plan schedules and allocate resources efficiently Choose the right ...

Clinical Practice of Cognitive Therapy with Children and Adolescents: The Nuts and Bolts

Clinical Practice of Cognitive Therapy with Children and Adolescents: The Nuts and Bolts

$31.00 - $48.00

This lively, practical book offers a complete guide to doing cognitive therapy with children and adolescents. Within a clear-cut theoretical framework, the authors describe how to adapt cognitive ...

Information Security Breaches: Avoidance and Treatment Based on ISO27001

Information Security Breaches: Avoidance and Treatment Based on ISO27001

$14.95 - $29.95

Although breaches of information security are not a new phenomenon, the methods used to perpetrate such breaches have changed considerably over the years. Leaking information to non-authorized people ...

Lessons in DSLR Workflow with Lightroom and Photoshop

Lessons in DSLR Workflow with Lightroom and Photoshop

$18.00 - $44.99

You’ve captured great images with your DSLR, now what? Jerry Courvoisier provides an easy-to-follow road map for importing, organizing, and editing your images using the best features of Adobe ...

Cognitive-Behavioral Therapy with Couples and Families: A Comprehensive Guide for Clinicians

Cognitive-Behavioral Therapy with Couples and Families: A Comprehensive Guide for Clinicians

$28.00 - $68.25

From a leading expert in cognitive-behavioral therapy and couple and family therapy, this comprehensive guide combines cutting-edge research and clinical wisdom. The author ...

loading