Hacks #82-95 Section 82. Detect Intrusions with Snort Section 83. Keep Track of Alerts Section 84. Real-Time Monitoring Section 85. Manage a Sensor Network Section 86. Write Your Own Snort Rules Section 87. Prevent and Contain Intrusions with Snort_inline Section 88. Automated Dynamic Firewalling with SnortSam Section 89. Detect Anomalous Behavior Section 90. Automatically Update Snort's Rules Section 91. Create a Distributed Stealth Sensor Network Section 92. Use Snort in High-Performance Environments with Barnyard Section 93. Detect and Prevent Web Application Intrusions Section 94. Simulate a Network of Vulnerable Hosts Section 95. Record Honeypot Activity |