Intrusion Detection
John Wiley & Sons Inc (Verlag)
978-0-471-29000-1 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
A complete nuts-and-bolts guide to improving network security using today's best intrusion detection products Firewalls cannot catch all of the hacks coming into your network. To properly safeguard your valuable information resources against attack, you need a full-time watchdog, ever on the alert, to sniff out suspicious behavior on your network. This book gives you the additional ammo you need. Terry Escamilla shows you how to combine and properly deploy today's best intrusion detection products in order to arm your network with a virtually impenetrable line of defense. He provides: Assessments of commercially available intrusion detection products: what each can and cannot do to fill the gaps in your network security Recommendations for dramatically improving network security using the right combination of intrusion detection products The lowdown on identification and authentication, firewalls, and access control Detailed comparisons between today's leading intrusion detection product categories A practical perspective on how different security products fit together to provide protection for your network The companion Web site at www wiley.com/compbooks/escamilla features: White papers Industry news Product information
TERRY ESCAMILLA, PhD, is a Senior Software Architect for IBM Corporation in Boulder, Colorado. He previously worked for Haystack Labs, now part of Network Associates, a leading vendor of intrusion detection products including the Stalker family of products. A well-respected specialist in computer security and software engineering, Dr. Escamilla spent six years with IBM before joining Haystack in 1996. After Haystack was acquired by Trusted Information Systems and then by Network Associates, Dr. Escamilla rejoined IBM to work on e-business solutions.
BEFORE INTRUSION DETECTION: TRADITIONAL COMPUTER SECURITY. Intrusion Detection and the Classic Security Model. The Role of Identification and Authentication in Your Environment. The Role of Access Control in Your Environment. Traditional Network Security Approaches. INTRUSION DETECTION: BEYOND TRADITIONAL SECURITY. Intrusion Detection and Why You Need It. Detecting Intruders on Your System Is Fun and Easy. Vulnerability Scanners. UNIX System-Level IDSs. Sniffing for Intruders. Intrusion Detection for NT. ROUNDING OUT YOUR ENVIRONMENT. You've Been Hit!. Intrusion Detection: Not the Last Chapter When It Comes To Security. Appendix. References. Index.
Erscheint lt. Verlag | 14.10.1998 |
---|---|
Zusatzinfo | Illustrations |
Verlagsort | New York |
Sprache | englisch |
Maße | 190 x 235 mm |
Gewicht | 624 g |
Einbandart | Paperback |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-471-29000-9 / 0471290009 |
ISBN-13 | 978-0-471-29000-1 / 9780471290001 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich