Snort For Dummies

From the Back Cover
Find out how to foil an attack on your network
Choose the right way to deploy and configure Snort — no experience required!

Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you train Snort to do your bidding. Discover how intrusion detection systems work, what kind you need, how to install and manage Snort on Linux® or Windows® systems, and more.

All this on the bonus CD-ROM

Snort Intrusion Detection System for Linux and Windows
ACID Snort Visualization Console
Barnyard unified logging tool and Oinkmaster rule manager
Assorted other Snort management tools
Discover how to:

Integrate Snort into your security plan
Decide on the best deployment
Create and update detection rules
Generate reports with ACID
Get real-time alerts in case of attack

About the Author
Charlie Scott is an Information Security Analyst for the City of Austin, where he helps maintain the City’s network security infrastructure and helps analyze intrusion detection data. He has nearly ten years of experience in the Internet industry and has been an avid user of open source security software that entire time. Charlie is a Certified Information Systems Security Professional (CISSP) and a Cisco Certified Network Professional (CCNP). Bert Hayes is a Security Technical Analyst for the State of Texas, where he maintains network security for a medium sized agency. In Bert’s ten years of IT industry experience, he has done everything from managing a corporate IT shop during a successful IPO to performing white hat penetration tests for corporate and government offices. He has long been a proponent of open source solutions, and is a Red Hat Certified Engineer (RHCE). Paul Wolfe is an independent information security consultant and author, specializing in open source security.

Related Articles

Hacking For Dummies 5th Edition

Learn to hack your own system to protect against malicious attacks from outside
Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources.

Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system—and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network.

Defend your system—and all of the data it holds—against the latest Windows 10 and Linux hacks
Develop an effective ethical hacking plan that keeps your system safe
Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies
Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure

Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it—and it will become your go-to reference when ethical hacking is on your to-do list.

Hacking for Dummies 2nd Edition

Are you worried about external hackers and rogue insiders breaking into your systems? Whether it’s social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys, you must become a hacker yourself—an ethical hacker.
Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound.

You’ll discover how to:

Work ethically, respect privacy, and save your system from crashing
Develop a hacking plan
Treat social engineers and preserve their honesty
Counter war dialing and scan infrastructures
Understand the vulnerabilities of Windows, Linux, and Novell NetWare
Prevent breaches in messaging systems, web applications, and databases
Report your results and managing security changes
Avoid deadly mistakes
Get management involved with defending your systems
As we enter into the digital era, protecting your systems and your company has never been more important. Don’t let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!

Hacking for Dummies 3rd Edition

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!
It’s bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.

Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you’ll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks.

Explores the malicious hackers’s mindset so that you can counteract or avoid attacks completely
Covers developing strategies for reporting vulnerabilities, managing security changes, and putting anti-hacking policies and procedures in place
Completely updated to examine the latest hacks to Windows 7 and the newest version of Linux
Explains ethical hacking and why it is essential

Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking.

Wireless Networks for Dummies

you’ve probably heard the expression, “It’s time to cut the cord.” Well, it may be time to “cut the cables” at your office and free yourself from your desk and computer. Wireless networks are the waves of the future—literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can:
Remain connected to the office in airports and hotels
Access the Internet and other network resources in the lunchroom, conference room, or anywhere there’s an access point
Use your PDA or laptop to query your database from the warehouse or the boardroom
Check e-mail wirelessly when you’re on the road
Get rid of the cable clutter in your office

Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm and an internationally known leader of security seminars. Peter Davis is founder of a firm specializing in the security, audit, and control of information. Together, they cut through the cables, clutter, and confusion and help you:

Get off to a quick start and get mobile with IrDA (Infrared Data Association) and Bluetooth
Perform a site survey and select the right standard, mode, access point, channel and antenna
Check online to verify degree of interoperability of devices from various vendors
Install clients and set up roaming
Combat security threats such as war driving, jamming, hijacking, and man-in-the-middle attacks
Implement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network)
Set up multiple access points to form a larger wireless network

Complete with suggestions of places to get connected, Web sites where you can get more information, tools you can use to monitor and improve security, and more, Wireless Networks For Dummies helps you pull the plug and go wireless!

Wireless Networks for Dummies

You’ve probably heard the expression, “It’s time to cut the cord.” Well, it may be time to “cut the cables” at your office and free yourself from your desk and computer. Wireless networks are the waves of the future—literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can:

Remain connected to the office in airports and hotels
Access the Internet and other network resources in the lunchroom, conference room, or anywhere there’s an access point
Use your PDA or laptop to query your database from the warehouse or the boardroom
Check e-mail wirelessly when you’re on the road
Get rid of the cable clutter in your office

Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm and an internationally known leader of security seminars. Peter Davis is founder of a firm specializing in the security, audit, and control of information. Together, they cut through the cables, clutter, and confusion and help you:

Get off to a quick start and get mobile with IrDA (Infrared Data Association) and Bluetooth
Perform a site survey and select the right standard, mode, access point, channel and antenna
Check online to verify degree of interoperability of devices from various vendors
Install clients and set up roaming
Combat security threats such as war driving, jamming, hijacking, and man-in-the-middle attacks
Implement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network)
Set up multiple access points to form a larger wireless network

Complete with suggestions of places to get connected, Web sites where you can get more information, tools you can use to monitor and improve security, and more, Wireless Networks For Dummies helps you pull the plug and go wireless!