Implementing Intrusion Detection Systems - Tim Crothers

Implementing Intrusion Detection Systems

A Hands-On Guide for Securing the Network

(Autor)

Buch | Softcover
336 Seiten
2002
John Wiley & Sons Inc (Verlag)
978-0-7645-4949-6 (ISBN)
50,40 inkl. MwSt
Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling.
* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures

TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.

Preface.

Acknowledgments.

Chapter 1: An Overview of Intrusion Detection.

Chapter 2: Network-Based Intrusion Detection Systems.

Chapter 3: Host-Based Intrusion Detection.

Chapter 4: Handling Alerts.

Chapter 5: Coping with Challenges to IDS.

Chapter 6: Deploying IDS.

Chapter 7: Maximizing Your IDS.

Chapter 8: Sample IDS Deployment.

Appendix A: Understanding tcpdump Packet Headers.

Appendix B: Additional Resources.

Appendix C: Glossary.

Appendix D: TCP/IP Quick Reference.

Appendix E: IDS Product Information.

Index.

Erscheint lt. Verlag 13.12.2002
Verlagsort New York
Sprache englisch
Maße 191 x 235 mm
Gewicht 494 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-7645-4949-9 / 0764549499
ISBN-13 978-0-7645-4949-6 / 9780764549496
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
94,95