This all new book covering the brand new Snort version 2.6 from members of the Snort developers t...
The first two books in this series 'Stealing the Network: How to Own the Box¿ and 'Stealing the N...
This book focuses on installing, configuring and optimizing Nessus, which is a remote security sc...
Penetration testing a network requires a delicate balance of art and science. A penetration teste...
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection a...
Called 'the leader in the Snort IDS book arms race' by Richard Bejtlich, top Amazon reviewer, thi...
Ethereal is the #2 most popular open source security tool used by system administrators and secur...
This all new book covering the brand new Snort version 2.6 from members of the Snort developers t...
This all new book covering the brand new Snort version 2.6 from members of the Snort developers t...