|Other Retailer||Price Checked Time||Their Price in AUD||Our Price|
|Amazon UK||yesterday||91.95||$78.08||You save $13.87|
|Book Depository US||today||78.31||$78.08||You save $0.23|
ACKNOWLEDGMENTSFOREWORDINTRODUCTIONChapter 1: CARE AND FEEDING OF IPTABLESChapter 2: NETWORK LAYER ATTACKS AND DEFENSEChapter 3: TRANSPORT LAYER ATTACKS AND DEFENSEChapter 4: APPLICATION LAYER ATTACKS AND DEFENSEChapter 5: INTRODUCING PSAD: THE PORT SCAN ATTACK DETECTORChapter 6: PSAD OPERATIONS: DETECTING SUSPICIOUS TRAFFICChapter 7: ADVANCED PSAD TOPICS: FROM SIGNATURE MATCHING TO OS FINGERPRINTINGChapter 8: ACTIVE RESPONSE WITH PSADChapter 9: TRANSLATING SNORT RULES INTO IPTABLES RULESChapter 10: DEPLOYING FWSNORTChapter 11: COMBINING PSAD AND FWSNORTChapter 12: PORT KNOCKING VS. SINGLE PACKET AUTHORIZATIONChapter 13: INTRODUCING FWKNOPChapter 14: VISUALIZING IPTABLES LOGSATTACK SPOOFINGA COMPLETE FWSNORT SCRIPTCOLOPHON
Michael Rash is a Security Architect on the Dragon Intrusion Detection System with Enterasys Networks, Inc., and is a frequent contributor to open source projects. As the creator of psad, fwknop, and fwsnort, Rash is an expert on firewalls, IDSs, OS fingerprinting, and the Snort rules language. He is co-author of the book Snort 2.1 Intrusion Detection, lead-author and technical editor of the book Intrusion Prevention and Active Response, and has written security articles for Linux Journal, SysAdmin, and;login: .