Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Implementing Intrusion Detection Systems: A Hands-On Guide for Securing the Network

English

* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures

English

TIM CROTHERS, CCNA, CIW, MCSE, MCT, CNE, is chief security engineer for ITM Technology, an e-security provider, and the author of Internet Lockdown. He developed the curriculum for an Internet security consulting practice he headed at Prosoft, and has also been a consultant and trainer for IBM, Lucent Technologies, DEC, and other leading organizations.

English

Preface.

Acknowledgments.

Chapter 1: An Overview of Intrusion Detection.

Chapter 2: Network-Based Intrusion Detection Systems.

Chapter 3: Host-Based Intrusion Detection.

Chapter 4: Handling Alerts.

Chapter 5: Coping with Challenges to IDS.

Chapter 6: Deploying IDS.

Chapter 7: Maximizing Your IDS.

Chapter 8: Sample IDS Deployment.

Appendix A: Understanding tcpdump Packet Headers.

Appendix B: Additional Resources.

Appendix C: Glossary.

Appendix D: TCP/IP Quick Reference.

Appendix E: IDS Product Information.

Index.
loading