ORPP logo
Image from Google Jackets

Linux Firewalls : Attack Detection and Response.

By: Material type: TextTextPublisher: San Francisco : No Starch Press, Incorporated, 2007Copyright date: ©2007Edition: 1st edDescription: 1 online resource (335 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781593272289
Subject(s): Genre/Form: Additional physical formats: Print version:: Linux FirewallsDDC classification:
  • 005.8
LOC classification:
  • QA76.9.A25 -- R36 2007eb
Online resources:
Contents:
Intro -- BRIEF CONTENTS -- CONTENTS IN DETAIL -- ACKNOWLEDGMENTS -- FOREWORD -- INTRODUCTION -- CARE AND FEEDING OF IPTABLES -- NETWORK LAYER ATTACKS AND DEFENSE -- TRANSPORT LAYER ATTACKS AND DEFENSE -- APPLICATION LAYER ATTACKS AND DEFENSE -- INTRODUCING PSAD: THE PORT SCAN ATTACK DETECTOR -- PSAD OPERATIONS: DETECTING SUSPICIOUS TRAFFIC -- ADVANCED PSAD TOPICS: FROM SIGNATURE MATCHING TO OS FINGERPRINTING -- ACTIVE RESPONSE WITH PSAD -- TRANSLATING SNORT RULES INTO IPTABLES RULES -- DEPLOYING FWSNORT -- COMBINING PSAD AND FWSNORT -- PORT KNOCKING VS . SINGLE PACKET AUTHORIZATION -- INTRODUCING FWKNOP -- VISUALIZING IPTABLES LOGS -- ATTACK SPOOFING -- A COMPLETE FWSNORT SCRIPT -- INDEX.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- BRIEF CONTENTS -- CONTENTS IN DETAIL -- ACKNOWLEDGMENTS -- FOREWORD -- INTRODUCTION -- CARE AND FEEDING OF IPTABLES -- NETWORK LAYER ATTACKS AND DEFENSE -- TRANSPORT LAYER ATTACKS AND DEFENSE -- APPLICATION LAYER ATTACKS AND DEFENSE -- INTRODUCING PSAD: THE PORT SCAN ATTACK DETECTOR -- PSAD OPERATIONS: DETECTING SUSPICIOUS TRAFFIC -- ADVANCED PSAD TOPICS: FROM SIGNATURE MATCHING TO OS FINGERPRINTING -- ACTIVE RESPONSE WITH PSAD -- TRANSLATING SNORT RULES INTO IPTABLES RULES -- DEPLOYING FWSNORT -- COMBINING PSAD AND FWSNORT -- PORT KNOCKING VS . SINGLE PACKET AUTHORIZATION -- INTRODUCING FWKNOP -- VISUALIZING IPTABLES LOGS -- ATTACK SPOOFING -- A COMPLETE FWSNORT SCRIPT -- INDEX.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.