Revere

Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Netw

Description: Implementing Intrusion Detection Systems by Tim Crothers Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling. FORMAT Paperback LANGUAGE English CONDITION Brand New Publisher Description * Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective * Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS * Features coverage of the recently revised IETF IDS specification * Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling * Provides step-by-step instructions for configuration procedures Back Cover Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network Here’s the in-the-trenches handbook you’ve been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You’ll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS. Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you’re responsible for network security, this is the guidebook that will help you get a good night’s sleep–at last.  You’ll learn how to: Implement an effective IDS for host, network, and combined systems Understand challenges like evasion, unknown attacks, and false alerts Verify, test, and fine-tune intrusion detection systems Analyze various IDS products and determine what meets your organization’s needs Cope with legal issues and architectural challenges Identify, verify, and respond to different types of attacks and alerts Investigate security breaches and prevent recurrences Flap Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network Heres the in-the-trenches handbook youve been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. Youll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS. Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If youre responsible for network security, this is the guidebook that will help you get a good nights sleep-at last. Youll learn how to: * Implement an effective IDS for host, network, and combined systems * Understand challenges like evasion, unknown attacks, and false alerts * Verify, test, and fine-tune intrusion detection systems * Analyze various IDS products and determine what meets your organizations needs * Cope with legal issues and architectural challenges * Identify, verify, and respond to different types of attacks and alerts * Investigate security breaches and prevent recurrences Author Biography TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations. Table of Contents Preface. Acknowledgments. Chapter 1: An Overview of Intrusion Detection. Chapter 2: Network-Based Intrusion Detection Systems. Chapter 3: Host-Based Intrusion Detection. Chapter 4: Handling Alerts. Chapter 5: Coping with Challenges to IDS. Chapter 6: Deploying IDS. Chapter 7: Maximizing Your IDS. Chapter 8: Sample IDS Deployment. Appendix A: Understanding tcpdump Packet Headers. Appendix B: Additional Resources. Appendix C: Glossary. Appendix D: TCP/IP Quick Reference. Appendix E: IDS Product Information. Index. Long Description Your in-depth guide to implementing and optimizing an effective intrusion detection system for your network Here s the in-the-trenches handbook you ve been looking for, loaded with information and tips from real case studies that will help you deploy, configure, and monitor an effective intrusion detection system. Step-by-step instructions guide you through the process of configuring identification and authentication, mandatory and discretionary access control, physical security, and more. You ll get practical knowledge of honeynets, IP and MAC addressing, log analysis, and IDS standards, and learn to manage network traffic volume in the IDS. Tim Crothers gives you the benefit of his own extensive experience, furnishing sample IDS deployments and professional tips that boost your efficiency. If you re responsible for network security, this is the guidebook that will help you get a good night s sleep at last. Feature Covers host, network and combined systems, managing traffic volume in IDS, intrusion signatures, log analysis, and incident handling. Provides step-by-step instructions for configuration procedures such as configuring identification and authentication, mandatory and discretionary access control, and physical security. Filters out any unnecessary theoretical information to provide real-world, hands-on information. Details ISBN0764549499 Author Tim Crothers Language English ISBN-10 0764549499 ISBN-13 9780764549496 Media Book DEWEY 005.8 Illustrations Yes Year 2002 Subtitle A Hands-On Guide for Securing the Network Country of Publication United States Short Title IMPLEMENTING INTRUSION DETECTI Format Paperback Edition 1st Affiliation ITM Technologies, Grand Rapids, Michigan DOI 10.1604/9780764549496 UK Release Date 2002-12-13 AU Release Date 2002-11-27 NZ Release Date 2002-11-27 Pages 336 Publisher John Wiley & Sons Inc Publication Date 2002-12-13 Imprint John Wiley & Sons Inc Place of Publication New York Audience General US Release Date 2002-12-13 We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:102474535;

Price: 79.63 AUD

Location: Melbourne

End Time: 2024-11-21T03:44:58.000Z

Shipping Cost: 10 AUD

Product Images

Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Netw

Item Specifics

Restocking fee: No

Return shipping will be paid by: Buyer

Returns Accepted: Returns Accepted

Item must be returned within: 30 Days

ISBN-13: 9780764549496

Book Title: Implementing Intrusion Detection Systems

Item Height: 235 mm

Item Width: 190 mm

Author: Tim Crothers

Publication Name: Implementing Intrusion Detection Systems: a Hands-On Guide for Securing the Network

Format: Paperback

Language: English

Publisher: John Wiley & Sons Inc

Subject: Computer Science

Publication Year: 2002

Type: Textbook

Item Weight: 621 g

Number of Pages: 336 Pages

Recommended

Implementing Intrusion Detection Systems: A Hands
Implementing Intrusion Detection Systems: A Hands

$19.99

View Details
Intrusion
Intrusion

$33.98

View Details
Implementing Intrusion Detection Systems Tim Crothers Paperback
Implementing Intrusion Detection Systems Tim Crothers Paperback

$66.99

View Details
Implementing Intrusion Detection Systems : A Hands-On Guide for Securing the ...
Implementing Intrusion Detection Systems : A Hands-On Guide for Securing the ...

$35.57

View Details
INTRUSION
INTRUSION

$23.98

View Details
Crothers - Implementing Intrusion Detection Systems - New paperback o - S9000z
Crothers - Implementing Intrusion Detection Systems - New paperback o - S9000z

$76.20

View Details
Implementing Enterprise Cyber Security with Open-Source Software and Standard Ar
Implementing Enterprise Cyber Security with Open-Source Software and Standard Ar

$163.44

View Details
INTRUSION
INTRUSION

$5.82

View Details
Intrusions
Intrusions

$5.82

View Details
Intrusions
Intrusions

$8.49

View Details