Network Security Hacks [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Hacks [Electronic resources] - نسخه متنی

Andrew Lockhart

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید








[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

ac command (process accounting)

Accept header, logging requests without

accept option, SnortSam

access.conf file (pam_access module)

ACID (Analysis Console for Intrusion Databases)

archiving database, configuring

Barnyard logging of Snort events

database tables, creating for

graphing, configuring

libraries used with

sensor id

ACLs (access control lists)

application availability, restricting for users

grsecurity
2nd

Windows event logs, securing

activate and dynamic actions, Snort rules

Address Resolution Protocol
[See ARP]

address space layouts, randomization with grsecurity

address spoofing

detecting ARP spoofing

preventing for internal addresses with FilterPacket

ADODB (PHP code library)
2nd

AIDE

alerts

configuring Snort for

generated by Spade

IDS sensor, tracking

Snort NIDS

analyzing with Sguil

handling with Barnyard

tracking with ACID

unified output format

Analysis Console for Intrusion Databases
[See ACID]

anomalous network behavior, detecting with Spade

Apache web server

configuring to listen on specific interface

installing with SSL and suEXEC

mod_security

append-only (file attribute)

preventing removal of

applications

restricting availability to users

restricting with grsecurity

AppSec program (Windows)

Argus (Audit Record Generation and Utilization System)

ra command, querying with

XML output

ARIN (American Registry for Internet Numbers)

ARP (Address Resolution Protocol)

arpd, starting with honeyd

cache poisioning

creating static ARP table

detecting ARP spoofing

proxy arp

sniffdet tool, ARP test

arp command

finding system MAC address

Arpwatch
2nd

attacks
[See also entries under individual attack names]

filtering rules that help to prevent

auditing

enabling on Windows systems

mod_security features for

authenticated gateway, creating

authentication

MySQL source, using with proftpd

PAM, controlling login access

authpf shell (OpenBSD)

AutoRPM (system update package)

Avaya Labs, LibSafe technology


/ 158