From the Back Cover
Find out how to foil an attack on your network
Choose the right way to deploy and configure Snort no experience required!
Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you train Snort to do your bidding. Discover how intrusion detection systems work, what kind you need, how to install and manage Snort on Linux® or Windows® systems, and more.
All this on the bonus CD-ROM
Snort Intrusion Detection System for Linux and Windows
ACID Snort Visualization Console
Barnyard unified logging tool and Oinkmaster rule manager
Assorted other Snort management tools
Discover how to:
Integrate Snort into your security plan
Decide on the best deployment
Create and update detection rules
Generate reports with ACID
Get real-time alerts in case of attack
About the Author
Charlie Scott is an Information Security Analyst for the City of Austin, where he helps maintain the City’s network security infrastructure and helps analyze intrusion detection data. He has nearly ten years of experience in the Internet industry and has been an avid user of open source security software that entire time. Charlie is a Certified Information Systems Security Professional (CISSP) and a Cisco Certified Network Professional (CCNP). Bert Hayes is a Security Technical Analyst for the State of Texas, where he maintains network security for a medium sized agency. In Bert’s ten years of IT industry experience, he has done everything from managing a corporate IT shop during a successful IPO to performing white hat penetration tests for corporate and government offices. He has long been a proponent of open source solutions, and is a Red Hat Certified Engineer (RHCE). Paul Wolfe is an independent information security consultant and author, specializing in open source security.