This sequel to Beale series books covering the basics of the open source tools of Nessus, Snort, and Ethereal furthers developers' understanding of these applications. With working code examples and scripts, an Australian security specialist details the workings of each application's tools including Nessus Attack Scripting Language, Snort rules, and Ethereal dissectors. Downloadable code, a companion Web site, and related online materials are available. Beale is an information security specialist known for his work on mitigation technology. Distributed in the US by O'Reilly. Annotation ©2006 Book News, Inc., Portland, OR (booknews.com)
Read More
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book.Snort, Nessus, and Ethereal are the three most popular open source security tools in the worldOnly book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filtersCompanion Web site provides all working code and scripts from the book for download
Read Less