Implementing Intrusion Detection Systems – A Hands –On Guide for Securing the Network
A Hands–On Guide for Securing the Network
Paperback Engels 2002 9780764549496Samenvatting
∗ Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
∗ Packed with real–world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
∗ Features coverage of the recently revised IETF IDS specification
∗ Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
∗ Provides step–by–step instructions for configuration procedures
Specificaties
Lezersrecensies
Inhoudsopgave
<br />
<br /> Acknowledgments.
<br />
<br /> Chapter 1: An Overview of Intrusion Detection.
<br />
<br /> Chapter 2: Network–Based Intrusion Detection Systems.
<br />
<br /> Chapter 3: Host–Based Intrusion Detection.
<br />
<br /> Chapter 4: Handling Alerts.
<br />
<br /> Chapter 5: Coping with Challenges to IDS.
<br />
<br /> Chapter 6: Deploying IDS.
<br />
<br /> Chapter 7: Maximizing Your IDS.
<br />
<br /> Chapter 8: Sample IDS Deployment.
<br />
<br /> Appendix A: Understanding tcpdump Packet Headers.
<br />
<br /> Appendix B: Additional Resources.
<br />
<br /> Appendix C: Glossary.
<br />
<br /> Appendix D: TCP/IP Quick Reference.
<br />
<br /> Appendix E: IDS Product Information.
<br />
<br /> Index.
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan