Caswell et al., 2005 - Google Patents
Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security ApplicationsCaswell et al., 2005
- Document ID
- 12476342786774240146
- Author
- Caswell B
- Beale J
- Ramirez G
- Rathaus N
- Publication year
External Links
Snippet
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix …
- 238000001514 detection method 0 abstract description 22
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11916933B2 (en) | Malware detector | |
Singh et al. | Metasploit Penetration Testing Cookbook: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework | |
Stasinopoulos et al. | Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications | |
Ristic | Apache security | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Agarwal et al. | Metasploit penetration testing cookbook | |
Ansari | Web penetration testing with Kali Linux | |
Messier | Learning Kali Linux: security testing, penetration testing, and ethical hacking | |
Caswell et al. | Nessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications | |
Sharma | Kali Linux-An Ethical Hacker's Cookbook: End-to-end Penetration Testing Solutions | |
Lee | Framework for botnet emulation and analysis | |
Thompson et al. | The software vulnerability guide | |
Halton et al. | Penetration Testing: A Survival Guide | |
Sinha et al. | Beginning Ethical Hacking with Kali Linux | |
Halton et al. | Kali Linux 2: Windows Penetration Testing | |
US11038844B2 (en) | System and method of analyzing the content of encrypted network traffic | |
Cardwell | Advanced features of wireshark | |
Dhanjani et al. | Network Security Tools: Writing, Hacking, and Modifying Security Tools | |
Karamanos | Investigation of home router security | |
Rehim | Effective python penetration testing | |
Yu et al. | Trustworthy web services based on testing | |
Kumar | Penetration Testing Tools and Techniques | |
Bellatriu | Penetration testing automation system | |
Kuosmanen | Security Testing of WebSockets | |
Sharma | Kali Linux-An Ethical Hacker's Cookbook: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing |