11

http://searchsecurity.techtarget.com.au

* Part 1: Introduction to Snort intrusion detection and prevention
* Part 2: Hardware and network setup requirements
* Part 3: Installation prerequisites
* Part 4: Compiling and configuration with MySQL
* Part 5: Configuring Snort and setting up rules
* Part 6: Editing the snort.conf file

Full story »
mark's picture
Created by mark 7 years 14 weeks ago – Made popular 7 years 14 weeks ago
Category: High End   Tags: