Implementing Intrusion Detection Systems (häftad)
Fler böcker inom
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
336
Utgivningsdatum
2002-12-01
Upplaga
1
Förlag
Hungry Minds Inc,U.S.
Illustrationer
black & white illustrations
Dimensioner
235 x 191 x 17 mm
Vikt
613 g
Antal komponenter
1
Komponenter
3:B&W 7.5 x 9.25 in or 235 x 191 mm Perfect Bound on White w/Gloss Lam
SAB
Pubds
ISBN
9780764549496
Implementing Intrusion Detection Systems (häftad)

Implementing Intrusion Detection Systems

A Hands-On Guide for Securing the Network

Häftad Engelska, 2002-12-01
369
  • Skickas inom 7-10 vardagar.
  • Gratis frakt inom Sverige över 159 kr för privatpersoner.
Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It features coverage of the recently revised IETF IDS specification. It covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling. It provides step-by-step instructions for configuration procedures.
Visa hela texten

Passar bra ihop

  1. Implementing Intrusion Detection Systems
  2. +
  3. Designing Security Architecture Solutions

De som köpt den här boken har ofta också köpt Designing Security Architecture Solutions av Jay Ramachandran (häftad).

Köp båda 2 för 948 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Tim Crothers

Övrig information

TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.

Innehållsförteckning

Preface.Acknowledgments.Chapter 1: An Overview of Intrusion Detection.Chapter 2: Network-Based Intrusion Detection Systems.Chapter 3: Host-Based Intrusion Detection.Chapter 4: Handling Alerts.Chapter 5: Coping with Challenges to IDS.Chapter 6: Deploying IDS.Chapter 7: Maximizing Your IDS.Chapter 8: Sample IDS Deployment.Appendix A: Understanding tcpdump Packet Headers.Appendix B: Additional Resources.Appendix C: Glossary.Appendix D: TCP/IP Quick Reference.Appendix E: IDS Product Information.Index.