Implementing Intrusion Detection Systems
John Wiley & Sons Inc (Verlag)
978-0-7645-4949-6 (ISBN)
* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures
TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.
Preface.
Acknowledgments.
Chapter 1: An Overview of Intrusion Detection.
Chapter 2: Network-Based Intrusion Detection Systems.
Chapter 3: Host-Based Intrusion Detection.
Chapter 4: Handling Alerts.
Chapter 5: Coping with Challenges to IDS.
Chapter 6: Deploying IDS.
Chapter 7: Maximizing Your IDS.
Chapter 8: Sample IDS Deployment.
Appendix A: Understanding tcpdump Packet Headers.
Appendix B: Additional Resources.
Appendix C: Glossary.
Appendix D: TCP/IP Quick Reference.
Appendix E: IDS Product Information.
Index.
Erscheint lt. Verlag | 13.12.2002 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 191 x 235 mm |
Gewicht | 494 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-7645-4949-9 / 0764549499 |
ISBN-13 | 978-0-7645-4949-6 / 9780764549496 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich