𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Cover of Linux Firewalls

Linux Firewalls

✍ Scribed by Rash, Michael


Publisher
No Starch Press
Year
2009
Tongue
en-jm
Weight
432 KB
Category
Fiction
ISBN-13
9781593271411

No coin nor oath required. For personal study only.

✦ Synopsis


Linux firewalls provide capabilities that rival commercial firewalls, and are built upon the powerful Netfilter infrastructure in the Linux kernel. Linux Firewalls: Attack Detection and Response explores using Netfilter as an intrusion detection system (IDS) by combining it with Snort rulesets and custom open source software created by the author. Providing concrete examples to illustrate concepts, the book discusses Linux firewall log analysis and policies, passive network authentication and authorization, exploit packet traces and Snort ruleset emulation, and more. Perl and C code snippets are included to help readers maximize the deployment of Linux firewalls as effective mechanisms for the detection and prevention of various network-based attacks.


πŸ“œ SIMILAR VOLUMES


Linux Firewalls
✍ Ziegler, Robert L πŸ“‚ Fiction πŸ“… 0 🌐 German βš– 5 MB
cover
✍ Rash, Michael πŸ“‚ Fiction πŸ“… 2009 πŸ› No Starch Press 🌐 English βš– 1 MB

Linux firewalls provide capabilities that rival commercial firewalls, and are built upon the powerful Netfilter infrastructure in the Linux kernel. *Linux Firewalls: Attack Detection and Response* explores using Netfilter as an intrusion detection system (IDS) by combining it with Snort rulesets and

cover
✍ Rash, Michael πŸ“‚ Fiction πŸ“… 2009 πŸ› No Starch Press 🌐 en-GB βš– 1 MB

Linux firewalls provide capabilities that rival commercial firewalls, and are built upon the powerful Netfilter infrastructure in the Linux kernel. *Linux Firewalls: Attack Detection and Response* explores using Netfilter as an intrusion detection system (IDS) by combining it with Snort rulesets and

cover
✍ Rash, Michael πŸ“‚ Fiction πŸ“… 2007 πŸ› No Starch Press 🌐 English βš– 605 KB

### Product Description System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traf