Snort 2.1 Intrusion Detection, Second Edition
Jay Beale; Caswell
Sold by ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
AbeBooks Seller since March 24, 2009
Used - Soft cover
Condition: Used - Good
Ships within U.S.A.
Quantity: 1 available
Add to basketSold by ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
AbeBooks Seller since March 24, 2009
Condition: Used - Good
Quantity: 1 available
Add to basketPages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Seller Inventory # G1931836043I3N00
Mike Poor is a Founder and Senior Security Analyst for the DC firm Intelgardians Network Intelligence. In his recent past life he has worked for Sourcefire, as a research engineer, and for the SANS Institute as a member of the technical staff. As a consultant, Mike conducts penetration tests, vulnerability assessments, security audits and architecture reviews. His primary job focus however is in intrusion detection, response, and mitigation. Mike currently holds both GSEC and GCIA certifications and is an expert in network engineering and systems, network and web administration. Mike is an Incident Handler for the Internet Storm Center.
James C. Foster, is the Deputy Director, Global Security Development for Computer Sciences Corporation where he is leading the task of developing and delivering managed, educational, informational, consulting, and outsourcing security services. Prior to joining CSC, Foster was the Director of Research and Development for Foundstone Inc. and was responsible for all aspects of product and corporate R&D including corporate strategy and international market expansion. Preceding Foundstone, Foster was a Senior Advisor and Research Scientist with Guardent Inc. (acquired by Verisign in 2004 for $135 Million) and an adjunct author at Information Security Magazine (acquired for an undisclosed amount by TechTarget in 2003.) He is commonly asked to comment on pertinent security issues and has been sited in USAToday, Information Security Magazine, Baseline, Computer World, Secure Computing, and the MIT Technologist. James has co-authored or contributed to Snort 2.0 Intrusion Detection (! Syngress, ISBN: 1931836744), and Special Ops Host and Network Security for Microsoft, Unix, and Oracle (Syngress, ISBN: 1931836698).
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it's described
on the Abebooks website. If you're dissatisfied with your
purchase (Incorrect Book/Not as Described/Damaged) or if the
order hasn't arrived, you're eligible for a refund within 30
days of the estimated delivery date. If you've changed your
mind about a book that you've ordered, please use the "Ask
bookseller a question link to contact us" and we'll respond
as soon as possible.
All domestic Standard shipments are distributed from our warehouses by OSM, then handed off to the USPS for final delivery.
2-Day Shipping is delivered by FedEx, which does not deliver to PO boxes.
International shipments are tendered to the local postal service in the destination country for final delivery – We do not use courier services for international deliveries.
| Order quantity | 4 to 8 business days | 4 to 8 business days |
|---|---|---|
| First item | US$ 0.00 | US$ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.